- Description
- Buffer overflow in the Network Block Device (nbd) server 2.7.5 and earlier, and 2.8.0 through 2.8.2, allows remote attackers to execute arbitrary code via a large request, which is written past the end of the buffer because nbd does not account for memory taken by the reply header.
- Source
- security@debian.org
- NVD status
- Deferred
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
- nvd@nist.gov
- CWE-119
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wouter_verhelst:nbd:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E963ACA0-8AA5-4C12-A66F-B0308C682989",
"versionEndIncluding": "2.7.5"
},
{
"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.8.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "54469EAE-B59D-46F0-95D6-C7A3E1A5783E"
},
{
"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.8.2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "24C9D230-C76A-42B7-8C28-CEECAB2DF91E"
}
],
"operator": "OR"
}
]
}
]