Overview
A vulnerability in nfs-utils could permit an attacker to execute arbitrary code on the system or cause a denial of service.
Description
| The NFS protocol provides remote access to shared files accross networks. The nfs-utils package provides an NFS client and server for Linux systems. Nfs-utils on 64-bit architecture machines contains a stack-based buffer overflow vulnerability. The function "getquotainfo()" in "rquota_server.c" assumes certain values to be 32-bit in size during a call to memcpy(). On a 64-bit machine, this can cause a buffer overflow. | 
Impact
| A remote attacker could execute arbitrary code or create a denial-of-service condition on a vulnerable server running nfs-utils. | 
Solution
| Apply a patch from your vendor For vendor-specific information regarding vulnerable status and patch availability, please see the vendor section of this document. | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental | 
References
Acknowledgements
Red Hat credits Arjan van de Ven with reporting this vulnerability.
This document was written by Will Dormann.
Other Information
| CVE IDs: | CVE-2004-0946 | 
| Severity Metric: | 7.48 | 
| Date Public: | 2004-11-22 | 
| Date First Published: | 2005-03-04 | 
| Date Last Updated: | 2005-04-04 14:36 UTC | 
| Document Revision: | 10 |