{"vuid":"VU#258564","idnumber":"258564","name":"Linux NFS utils package \"rpc.mountd\" contains off-by-one buffer overflow in xlog() function","keywords":["Linux","NFS","nfs-utils","rpc.mountd","off-by-one","buffer overflow","xlog() function"],"overview":"A vulnerability in the Linux NFS (network File System) could permit an attacker to cause a denial of service, or potentially execute arbitrary code on the system.","clean_desc":"The Linux NFS (network File System) was developed to allow machines to mount a disk partition on a remote machine as if it were on a local hard drive. An off-by-one overflow exist in the xlog() function which handles logging of requests. Any attacker that is able to send RPC requests to vulnerable mountd daemon could exploit this vulnerability. An exploit for this vulnerability has been reported in the wild.","impact":"A remote attacker may be able to cause a denial of service, or potentially execute arbitrary code on the system.","resolution":"Version 1.0.4 has been released to address this issue.","workarounds":"","sysaffected":"","thanks":"Thanks to Janusz Niewiadomski for reporting this vulnerability.","author":"This document was written by Jason A Rafail.","public":["http://nfs.sourceforge.net/","http://sourceforge.net/projects/nfs/","http://www.secunia.com/advisories/9259/","http://xforce.iss.net/xforce/xfdb/12600","http://securitytracker.com/alerts/2003/Jul/1007187.html","http://www.securityfocus.com/bid/8179"],"cveids":["CVE-2003-0252"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2003-07-14T16:34:10Z","publicdate":"2003-07-14T00:00:00Z","datefirstpublished":"2003-09-17T19:36:46Z","dateupdated":"2003-09-17T19:36:57Z","revision":6,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"18","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"10","cam_impact":"17","cam_easeofexploitation":"10","cam_attackeraccessrequired":"15","cam_scorecurrent":"13.3875","cam_scorecurrentwidelyknown":"14.34375","cam_scorecurrentwidelyknownexploited":"23.90625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":13.3875,"vulnote":null}