Wouter Verhelst Network Block Device (nbd) 2.9.7

CPE Details

Wouter Verhelst Network Block Device (nbd) 2.9.7
2.9.7
2011-06-02
15h55 +00:00
2011-06-30
13h07 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:wouter_verhelst:nbd:2.9.7:*:*:*:*:*:*:*

Informations

Vendor

wouter_verhelst

Product

nbd

Version

2.9.7

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2013-7441 2015-05-29 13h00 +00:00 The modern style negotiation in Network Block Device (nbd-server) 2.9.22 through 3.3 allows remote attackers to cause a denial of service (root process termination) by (1) closing the connection during negotiation or (2) specifying a name for a non-existent export.
7.8
CVE-2015-0847 2015-05-29 13h00 +00:00 nbd-server.c in Network Block Device (nbd-server) before 3.11 does not properly handle signals, which allows remote attackers to cause a denial of service (deadlock) via unspecified vectors.
7.8
CVE-2013-6410 2013-12-07 19h00 +00:00 nbd-server in Network Block Device (nbd) before 3.5 does not properly check IP addresses, which might allow remote attackers to bypass intended access restrictions via an IP address that has a partial match in the authfile configuration file.
7.5
CVE-2011-1925 2011-05-31 18h00 +00:00 nbd-server.c in Network Block Device (nbd-server) 2.9.21 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by causing a negotiation failure, as demonstrated by specifying a name for a non-existent export.
5
CVE-2011-0530 2011-02-22 17h00 +00:00 Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
7.5