CVE-2011-0530

Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
References
Link Resource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=611187
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054071.html Patch
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054083.html Patch
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
http://openwall.com/lists/oss-security/2011/01/28/3 Patch
http://openwall.com/lists/oss-security/2011/01/31/7 Patch
http://secunia.com/advisories/43353 Vendor Advisory
http://secunia.com/advisories/43610
http://security.gentoo.org/glsa/glsa-201206-35.xml
http://www.debian.org/security/2011/dsa-2183
http://www.securityfocus.com/bid/46572
http://www.vupen.com/english/advisories/2011/0403 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0582
https://bugzilla.redhat.com/show_bug.cgi?id=673562 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/65720
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 Patch
https://hermes.opensuse.org/messages/8086846
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=611187
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054071.html Patch
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054083.html Patch
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
http://openwall.com/lists/oss-security/2011/01/28/3 Patch
http://openwall.com/lists/oss-security/2011/01/31/7 Patch
http://secunia.com/advisories/43353 Vendor Advisory
http://secunia.com/advisories/43610
http://security.gentoo.org/glsa/glsa-201206-35.xml
http://www.debian.org/security/2011/dsa-2183
http://www.securityfocus.com/bid/46572
http://www.vupen.com/english/advisories/2011/0403 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0582
https://bugzilla.redhat.com/show_bug.cgi?id=673562 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/65720
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 Patch
https://hermes.opensuse.org/messages/8086846
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:wouter_verhelst:nbd:*:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.0:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.1:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.2:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.3:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.4:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.5:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.6:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.7:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.8:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.9:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.10:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.11:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.12:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.13:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.14:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.15:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.16:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.17:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.18:*:*:*:*:*:*:*

History

No history.

Information

Published : 2011-02-22 19:00

Updated : 2025-04-11 00:51


NVD link : CVE-2011-0530

Mitre link : CVE-2011-0530

CVE.ORG link : CVE-2011-0530


JSON object : View

Products Affected

wouter_verhelst

  • nbd
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer