CERTA-2005-AVI-199
Vulnerability from certfr_avis
None
Description
rpc.mountd est un service permettant le montage depuis un serveur NFS de volumes distants.
bigskip
Selon SGI, deux vulnérabilités sont présentes dans le service rpc.mountd :
- CVE CAN-2005-139 : il est possible de contourner la limition d'accès en lecture ;
- CVE CAN-2005-138 : un déni de service est possible lorque les clients anonymes ne possèdent pas de résolution inverse du nom de machine.
Solution
Se référer au bulletin de sécurité de l'éditeur (cf. section Documentation) pour l'obtention des correctifs.
SGI IRIX versions 6.5.25, 6.5.26 et 6.5.27.
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eSGI IRIX versions 6.5.25, 6.5.26 et 6.5.27.\u003c/p\u003e",
"content": "## Description\n\nrpc.mountd est un service permettant le montage depuis un serveur NFS de\nvolumes distants.\n\nbigskip\n\nSelon SGI, deux vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans le service rpc.mountd\n:\n\n- CVE CAN-2005-139 : il est possible de contourner la limition d\u0027acc\u00e8s\n en lecture ;\n- CVE CAN-2005-138 : un d\u00e9ni de service est possible lorque les\n clients anonymes ne poss\u00e8dent pas de r\u00e9solution inverse du nom de\n machine.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur (cf. section\nDocumentation) pour l\u0027obtention des correctifs.\n",
"cves": [],
"initial_release_date": "2005-06-09T00:00:00",
"last_revision_date": "2005-06-09T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 SGI 20050601-01-P du 09 juin 2005 :",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20050601-01-P.asc"
}
],
"reference": "CERTA-2005-AVI-199",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2005-06-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
}
],
"summary": null,
"title": "Vuln\u00e9rabilit\u00e9s de rpc.mountd sous SGI IRIX",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 20050601-01-P de SGI",
"url": null
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…