Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: February 27th, 2015
Linux Security Week: February 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Mandrake: nfs-utils 64bit vulnerability fix Print E-mail
User Rating:      How can I rate this item?
Posted by Joe Shakespeare   
Mandrake Arjan van de Ven discovered a buffer overflow in rquotad on 64bit architectures; an improper integer conversion could lead to a buffer overflow. An attacker with access to an NFS share could send a specially crafted request which could then lead to the execution of arbitrary code.


                 Mandrakelinux Security Update Advisory

 Package name:           nfs-utils
 Advisory ID:            MDKSA-2005:005
 Date:                   January 11th, 2005

 Affected versions:	 10.0, 10.1, 9.2, Corporate Server 2.1

 Problem Description:

 Arjan van de Ven discovered a buffer overflow in rquotad on 64bit
 architectures; an improper integer conversion could lead to a
 buffer overflow.  An attacker with access to an NFS share could send a
 specially crafted request which could then lead to the execution of
 arbitrary code.
 The updated packages are provided to prevent this issue.


 Updated Packages:
 Mandrakelinux 10.0:
 71991bf34674e4bebd4870c24dce4929  10.0/RPMS/nfs-utils-1.0.6-2.2.100mdk.i586.rpm
 1c6231362def3c56d747b3ccc22b7597  10.0/RPMS/nfs-utils-clients-1.0.6-2.2.100mdk.i586.rpm
 bf52589c8d97f63f3024f90a79c201c9  10.0/SRPMS/nfs-utils-1.0.6-2.2.100mdk.src.rpm

 Mandrakelinux 10.0/AMD64:
 28bc6309e5488cd7bf294ae1a4ce68b2  amd64/10.0/RPMS/nfs-utils-1.0.6-2.2.100mdk.amd64.rpm
 ed8b7dfa77200e5badb473678a91bb2a  amd64/10.0/RPMS/nfs-utils-clients-1.0.6-2.2.100mdk.amd64.rpm
 bf52589c8d97f63f3024f90a79c201c9  amd64/10.0/SRPMS/nfs-utils-1.0.6-2.2.100mdk.src.rpm

 Mandrakelinux 10.1:
 bb7161793b2154c3e122adabaed9ed60  10.1/RPMS/nfs-utils-1.0.6-2.2.101mdk.i586.rpm
 e219e85405758a9ef9511eacf4118e07  10.1/RPMS/nfs-utils-clients-1.0.6-2.2.101mdk.i586.rpm
 7510d378225740169ae1a3dbaf0f223f  10.1/SRPMS/nfs-utils-1.0.6-2.2.101mdk.src.rpm

 Mandrakelinux 10.1/X86_64:
 ed70043e2d95cbebc2cd12e0f973a29f  x86_64/10.1/RPMS/nfs-utils-1.0.6-2.2.101mdk.x86_64.rpm
 7c086dfb028423e9105525111194aff5  x86_64/10.1/RPMS/nfs-utils-clients-1.0.6-2.2.101mdk.x86_64.rpm
 7510d378225740169ae1a3dbaf0f223f  x86_64/10.1/SRPMS/nfs-utils-1.0.6-2.2.101mdk.src.rpm

 Corporate Server 2.1:
 cc1b1f4c8232db49f40df9117d2237f8  corporate/2.1/RPMS/nfs-utils-1.0.1-1.3.C21mdk.i586.rpm
 8af58044e57d46921c0ad8745826d1dd  corporate/2.1/RPMS/nfs-utils-clients-1.0.1-1.3.C21mdk.i586.rpm
 9d167452a31fc1e5ef4f43086f0d7b34  corporate/2.1/SRPMS/nfs-utils-1.0.1-1.3.C21mdk.src.rpm

 Corporate Server 2.1/x86_64:
 c7f8d994d4d261d41f6bf246c280fb10  x86_64/corporate/2.1/RPMS/nfs-utils-1.0.1-1.3.C21mdk.x86_64.rpm
 77be17723eb840715500edb3cf8c687b  x86_64/corporate/2.1/RPMS/nfs-utils-clients-1.0.1-1.3.C21mdk.x86_64.rpm
 9d167452a31fc1e5ef4f43086f0d7b34  x86_64/corporate/2.1/SRPMS/nfs-utils-1.0.1-1.3.C21mdk.src.rpm

 Mandrakelinux 9.2:
 00f2319415647d9fa85926cc05271793  9.2/RPMS/nfs-utils-1.0.5-1.2.92mdk.i586.rpm
 680ef7be663350d18ad5b7f94bbc2e21  9.2/RPMS/nfs-utils-clients-1.0.5-1.2.92mdk.i586.rpm
 4a49c7508d166c62b6d76e7c1cccbacd  9.2/SRPMS/nfs-utils-1.0.5-1.2.92mdk.src.rpm

 Mandrakelinux 9.2/AMD64:
 c0e275ce5838575eda14efb2d582aefc  amd64/9.2/RPMS/nfs-utils-1.0.5-1.2.92mdk.amd64.rpm
 779856f22f146342ab6e42c4f20acd95  amd64/9.2/RPMS/nfs-utils-clients-1.0.5-1.2.92mdk.amd64.rpm
 4a49c7508d166c62b6d76e7c1cccbacd  amd64/9.2/SRPMS/nfs-utils-1.0.5-1.2.92mdk.src.rpm

 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandrakesoft for security.  You can obtain
 the GPG public key of the Mandrakelinux Security Team by executing:

  gpg --recv-keys --keyserver 0x22458A98

 You can view other update advisories for Mandrakelinux at:

 If you want to report vulnerabilities, please contact

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team

< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
D-Link Routers Haunted by Remote Command Injection Bug -
Mozilla Pushes Hot Fix to Remove Superfish Cert From Firefox
The Deadly Game of Cyber Mis-Attribution
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.