Vulnerability Bulletins |
Denegación de servicio en el demonio rpc.statd del paquete "nfs-utils" de Linux |
|
Vulnerability classification |
|
Property | Value |
Confidence level | Oficial |
Impact | Denegación de Servicio |
Dificulty | Avanzado |
Required attacker level | Acceso remoto sin cuenta a un servicio exotico |
System information |
|
Property | Value |
Affected manufacturer | GNU/Linux |
Affected software | nfs-utils |
Description |
|
Se ha encontrado una vulnerabilidad en el demonio statd del paquete "nfs-utils" de Linux que podría causar una Denegación de Servicio. El problema se debe a que rpc.statd no ignora la señal "SIGPIPE" la cual haría que el servidor se apagara si una conexión TCP mal configurada o establecida maliciosamente acabase prematuramente. |
|
Solution |
|
Actualización de Software Mandrake Linux Mandrake Linux 9.2 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/nfs-utils-1.0.5-1.1.92mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/nfs-utils-clients-1.0.5-1.1.92mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/SRPMS/nfs-utils-1.0.5-1.1.92mdk.src.rpm Mandrak Linux 9.2/AMD64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/nfs-utils-1.0.5-1.1.92mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/nfs-utils-clients-1.0.5-1.1.92mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/SRPMS/nfs-utils-1.0.5-1.1.92mdk.src.rpm Mandrake Linux 10.0 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/nfs-utils-1.0.6-2.1.100mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/nfs-utils-clients-1.0.6-2.1.100mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/SRPMS/nfs-utils-1.0.6-2.1.100mdk.src.rpm Mandrake Linux 10.0/AMD64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/nfs-utils-1.0.6-2.1.100mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/nfs-utils-clients-1.0.6-2.1.100mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/SRPMS/nfs-utils-1.0.6-2.1.100mdk.src.rpm Mandrake Linux 10.1 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/nfs-utils-1.0.6-2.1.101mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/nfs-utils-clients-1.0.6-2.1.101mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/SRPMS/nfs-utils-1.0.6-2.1.101mdk.src.rpm Mandrakelinux 10.1/X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/nfs-utils-1.0.6-2.1.101mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/nfs-utils-clients-1.0.6-2.1.101mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/SRPMS/nfs-utils-1.0.6-2.1.101mdk.src.rpm Corporate Server 2.1 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/nfs-utils-1.0.1-1.2.C21mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/nfs-utils-clients-1.0.1-1.2.C21mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/SRPMS/nfs-utils-1.0.1-1.2.C21mdk.src.rpm Corporate Server 2.1/X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/nfs-utils-1.0.1-1.2.C21mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/nfs-utils-clients-1.0.1-1.2.C21mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/SRPMS/nfs-utils-1.0.1-1.2.C21mdk.src.rpm Debian Linux Debian Linux 3.0 Source: http://security.debian.org/pool/updates/main/n/nfs-utils/nfs-utils_1.0-2woody3.dsc http://security.debian.org/pool/updates/main/n/nfs-utils/nfs-utils_1.0-2woody3.tar.gz Arquitectura Alpha: http://security.debian.org/pool/updates/main/n/nfs-utils/nfs-common_1.0-2woody3_alpha.deb http://security.debian.org/pool/updates/main/n/nfs-utils/nfs-kernel-server_1.0-2woody3_alpha.deb http://security.debian.org/pool/updates/main/n/nfs-utils/nhfsstone_1.0-2woody3_alpha.deb Arquitectura ARM: http://security.debian.org/pool/updates/main/n/nfs-utils/nfs-common_1.0-2woody3_arm.deb http://security.debian.org/pool/updates/main/n/nfs-utils/nfs-kernel-server_1.0-2woody3_arm.deb http://security.debian.org/pool/updates/main/n/nfs-utils/nhfsstone_1.0-2woody3_arm.deb Arquitectura Intel IA-32: http://security.debian.org/pool/updates/main/n/nfs-utils/nfs-common_1.0-2woody3_i386.deb http://security.debian.org/pool/updates/main/n/nfs-utils/nfs-kernel-server_1.0-2woody3_i386.deb http://security.debian.org/pool/updates/main/n/nfs-utils/nhfsstone_1.0-2woody3_i386.deb Arquitectura Intel IA-64: http://security.debian.org/pool/updates/main/n/nfs-utils/nfs-common_1.0-2woody3_ia64.deb http://security.debian.org/pool/updates/main/n/nfs-utils/nfs-kernel-server_1.0-2woody3_ia64.deb http://security.debian.org/pool/updates/main/n/nfs-utils/nhfsstone_1.0-2woody3_ia64.deb Arquitectura HP Precision: http://security.debian.org/pool/updates/main/n/nfs-utils/nfs-common_1.0-2woody3_hppa.deb http://security.debian.org/pool/updates/main/n/nfs-utils/nfs-kernel-server_1.0-2woody3_hppa.deb http://security.debian.org/pool/updates/main/n/nfs-utils/nhfsstone_1.0-2woody3_hppa.deb Arquitectura Motorola 680x0: http://security.debian.org/pool/updates/main/n/nfs-utils/nfs-common_1.0-2woody3_m68k.deb http://security.debian.org/pool/updates/main/n/nfs-utils/nfs-kernel-server_1.0-2woody3_m68k.deb http://security.debian.org/pool/updates/main/n/nfs-utils/nhfsstone_1.0-2woody3_m68k.deb Arquitectura Big endian MIPS: http://security.debian.org/pool/updates/main/n/nfs-utils/nfs-common_1.0-2woody3_mips.deb http://security.debian.org/pool/updates/main/n/nfs-utils/nfs-kernel-server_1.0-2woody3_mips.deb http://security.debian.org/pool/updates/main/n/nfs-utils/nhfsstone_1.0-2woody3_mips.deb Arquitectura Little endian MIPS: http://security.debian.org/pool/updates/main/n/nfs-utils/nfs-common_1.0-2woody3_mipsel.deb http://security.debian.org/pool/updates/main/n/nfs-utils/nfs-kernel-server_1.0-2woody3_mipsel.deb http://security.debian.org/pool/updates/main/n/nfs-utils/nhfsstone_1.0-2woody3_mipsel.deb Arquitectura PowerPC: http://security.debian.org/pool/updates/main/n/nfs-utils/nfs-common_1.0-2woody3_powerpc.deb http://security.debian.org/pool/updates/main/n/nfs-utils/nfs-kernel-server_1.0-2woody3_powerpc.deb http://security.debian.org/pool/updates/main/n/nfs-utils/nhfsstone_1.0-2woody3_powerpc.deb Arquitectura IBM S/390: http://security.debian.org/pool/updates/main/n/nfs-utils/nfs-common_1.0-2woody3_s390.deb http://security.debian.org/pool/updates/main/n/nfs-utils/nfs-kernel-server_1.0-2woody3_s390.deb http://security.debian.org/pool/updates/main/n/nfs-utils/nhfsstone_1.0-2woody3_s390.deb Arquitectura Sun Sparc: http://security.debian.org/pool/updates/main/n/nfs-utils/nfs-common_1.0-2woody3_sparc.deb http://security.debian.org/pool/updates/main/n/nfs-utils/nfs-kernel-server_1.0-2woody3_sparc.deb http://security.debian.org/pool/updates/main/n/nfs-utils/nhfsstone_1.0-2woody3_sparc.deb Red Hat Linux Red Hat Desktop (v. 3) & SRPMS: nfs-utils-1.0.6-33EL.src.rpm Red Hat Desktop (v. 3) & IA-32: nfs-utils-1.0.6-33EL.i386.rpm Red Hat Desktop (v. 3) & x86_64: nfs-utils-1.0.6-33EL.x86_64.rpm Red Hat Enterprise Linux AS (v. 3) & SRPMS: nfs-utils-1.0.6-33EL.src.rpm Red Hat Enterprise Linux AS (v. 3) & IA-32: nfs-utils-1.0.6-33EL.i386.rpm Red Hat Enterprise Linux AS (v. 3) & IA-64: nfs-utils-1.0.6-33EL.ia64.rpm Red Hat Enterprise Linux AS (v. 3) & PPC: nfs-utils-1.0.6-33EL.ppc.rpm Red Hat Enterprise Linux AS (v. 3) & s390: nfs-utils-1.0.6-33EL.s390.rpm Red Hat Enterprise Linux AS (v. 3) & s390x: nfs-utils-1.0.6-33EL.s390x.rpm Red Hat Enterprise Linux AS (v. 3) & x86_64: nfs-utils-1.0.6-33EL.x86_64.rpm Red Hat Enterprise Linux ES (v. 3) & SRPMS: nfs-utils-1.0.6-33EL.src.rpm Red Hat Enterprise Linux ES (v. 3) & IA-32: nfs-utils-1.0.6-33EL.i386.rpm Red Hat Enterprise Linux ES (v. 3) & IA-64: nfs-utils-1.0.6-33EL.ia64.rpm Red Hat Enterprise Linux ES (v. 3) & x86_64: nfs-utils-1.0.6-33EL.x86_64.rpm Red Hat Enterprise Linux WS (v. 3) & SRPMS: nfs-utils-1.0.6-33EL.src.rpm Red Hat Enterprise Linux WS (v. 3) & IA-32: nfs-utils-1.0.6-33EL.i386.rpm Red Hat Enterprise Linux WS (v. 3) & IA-64: nfs-utils-1.0.6-33EL.ia64.rpm Red Hat Enterprise Linux WS (v. 3) & x86_64: nfs-utils-1.0.6-33EL.x86_64.rpm https://rhn.redhat.com/ Red Hat Linux (nuevos parches) Red Hat Enterprise Linux AS (v. 2.1) / SRPMS: nfs-utils-0.3.3-11.src.rpm Red Hat Enterprise Linux AS (v. 2.1) / IA-32: nfs-utils-0.3.3-11.i386.rpm Red Hat Enterprise Linux AS (v. 2.1) / IA-64: nfs-utils-0.3.3-11.ia64.rpm Red Hat Enterprise Linux ES (v. 2.1) / SRPMS: nfs-utils-0.3.3-11.src.rpm Red Hat Enterprise Linux ES (v. 2.1) / IA-32: nfs-utils-0.3.3-11.i386.rpm Red Hat Enterprise Linux WS (v. 2.1) / SRPMS: nfs-utils-0.3.3-11.src.rpm Red Hat Enterprise Linux WS (v. 2.1) / IA-32: nfs-utils-0.3.3-11.i386.rpm Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor / SRPMS: nfs-utils-0.3.3-11.src.rpm Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor / IA-64: nfs-utils-0.3.3-11.ia64.rpm https://rhn.redhat.com/ |
|
Standar resources |
|
Property | Value |
CVE | CAN-2004-1014 |
BID | |
Other resources |
|
Mandrake Linux security advisory (MDKSA-2004:146) http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:146 Debian Security Advisory DSA 606-1 http://lists.debian.org/debian-security-announce/debian-security-announce-2004/msg00215.html Red Hat Linux Security Advisory (RHSA-2004:583-09) https://rhn.redhat.com/errata/RHSA-2004-583.html Red Hat Linux Security Advisory RHSA-2005:014-04 https://rhn.redhat.com/errata/RHSA-2005-014.html |
Version history |
||
Version | Comments | Date |
1.0 | Aviso emitido | 2004-12-07 |
1.1 | Aviso emitido por Debian Linux (DSA 606-1) | 2004-12-09 |
1.2 | Aviso emitido por Red Hat Linux (RHSA-2004:583-09) | 2004-12-21 |
1.3 | Nuevo aviso emitido por Red Hat Linux (RHSA-2005:014-04) | 2005-01-13 |