New version of nfs-server fixes remote exploit

    Date13 Dec 1999
    CategoryDebian
    3238
    Posted ByLinuxSecurity Advisories
    The version of nfs-server that was distributed in Debian GNU/Linux 2.1 had a buffer overflow in fh_buildpath(). It assumed that the total length of a path would never exceed (PATH_MAX_NAME_MAX). With a read/write exported directory people could created longes path and cause a bufferoverflow.
    -----BEGIN PGP SIGNED MESSAGE-----
    
    - ------------------------------------------------------------------------
    Debian Security Advisory                             This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/      
                       Wichert Akkerman
    November 11, 1999
    - ------------------------------------------------------------------------
    
    
    The version of nfs-server that was distributed in Debian GNU/Linux 2.1 had a
    buffer overflow in fh_buildpath(). It assumed that the total length of a path
    would never exceed (PATH_MAX_NAME_MAX). With a read/write exported directory
    people could created longes path and cause a bufferoverflow.
    
    This has been addressed in version 2.2beta37-1slink.1, and we recommend you
    upgrade your nfs-server package immediately.
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    Debian GNU/Linux 2.1 alias slink
    - --------------------------------
    
      This version of Debian was released only for Intel, the Motorola
      680x0, the alpha and the Sun sparc architecture.
    
      Source archives:
        http://security.debian.org/dists/stable/updates/source/nfs-
    server_2.2beta37-1slink.1.diff.gz
          MD5 checksum: 277c6daafd5b6f3947908a40761473d1
        http://security.debian.org/dists/stable/updates/source/nfs-
    server_2.2beta37-1slink.1.dsc
          MD5 checksum: c9bcdd19e29055d420e1c50dee6425d4
        http://security.debian.org/dists/stable/updates/so
    urce/nfs-server_2.2beta37.orig.tar.gz
          MD5 checksum: afe0f88c48add25f304a387ae4fb40ba
    
      Alpha architecture:
        http://security.debian.org/dists/stable/updates/binary-
    alpha/nfs-server_2.2beta37-1slink.1_alpha.deb
          MD5 checksum: 5e9d134fcc8834e5cf6a7dedb2394f7b
    
      Intel ia32 architecture:
        http://security.debian.org/dists/stable/updates/binary-
    i386/nfs-server_2.2beta37-1slink.1_i386.deb
          MD5 checksum: f5c4f2cc59101dc15bfc66530cb4d9e1
    
      Motorola 680x0 architecture:
        http://security.debian.org/dists/stable/updates/binary-
    m68k/nfs-server_2.2beta37-1slink.1_m68k.deb
          MD5 checksum: 672a8509a53f52d71efcde29b37780aa
    
      Sun Sparc architecture:
        http://security.debian.org/dists/stable/updates/binary-
    sparc/nfs-server_2.2beta37-1slink.1_sparc.deb
          MD5 checksum: c882894e79ede2c9af4d52566db59971
    
    
      These files will be moved into
      ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon.
    
    
    For not yet released architectures please refer to the appropriate
    directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .
    
    - -- 
    - ----------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable 
    updates
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    -----BEGIN PGP SIGNATURE-----
    Version: 2.6.3ia
    Charset: noconv
    
    iQB1AwUBOCr1jqjZR/ntlUftAQEXpgL8CB3ZmEi7fb9KXGcaksuVE2X0K8KR66eZ
    tVcFqXKElX1KnLCzi5OQ38hPg6qHBLhiTKhhNcYNotTs+2uEHvjKhq4ml88tiv1k
    7vE5ZARYXGWiOxfao20zYzuzg6Q8N4iN
    =gTX8
    -----END PGP SIGNATURE-----
    
    

    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"5","type":"x","order":"1","pct":55.56,"resources":[]},{"id":"88","title":"Should be more technical","votes":"3","type":"x","order":"2","pct":33.33,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"1","type":"x","order":"3","pct":11.11,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    Advisories

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.