Skip to navigation

Security Advisory Updated nfs-utils packages fix denial of service vulnerability

Advisory: RHSA-2003:206-08
Type: Security Advisory
Severity: N/A
Issued on: 2003-07-14
Last updated on: 2003-07-30
Affected Products: Red Hat Linux 7.1
Red Hat Linux 7.1 for iSeries
Red Hat Linux 7.1 for pSeries
Red Hat Linux 7.2
Red Hat Linux 7.3
Red Hat Linux 8.0
Red Hat Linux 9
CVEs (cve.mitre.org): CVE-2003-0252

Details

Updated nfs-utils packages are available that fix a remotely exploitable
Denial of Service vulnerability.

[Updated 30 July 2003]
Added packages for Red Hat Linux on IBM iSeries and pSeries systems.

The nfs-utils package provides a daemon for the kernel NFS server and
related tools.

Janusz Niewiadomski found a buffer overflow bug in nfs-utils version 1.0.3
and earlier. This bug could be exploited by an attacker, causing a remote
Denial of Service (crash). It is not believed that this bug could lead to
remote arbitrary code execution.

Users are advised to update to these erratum packages, which contain a
backported security patch supplied by the nfs-utils maintainers and are not
vulnerable to this issue.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Updated packages

Red Hat Linux 7.1

SRPMS:
ftp://updates.redhat.com/rhn/repository/NULL/nfs-utils/0.3.1-6.71/SRPMS/nfs-utils-0.3.1-6.71.src.rpm
Missing file
    MD5: 310db07d759fe4e4462ac555d70f47b2
 
IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/nfs-utils/0.3.1-6.71/i386/nfs-utils-0.3.1-6.71.i386.rpm
Missing file
    MD5: ab8ca9b6daf3f65a720e47a8f7bd7b1d
 
Red Hat Linux 7.1 for iSeries

SRPMS:
ftp://updates.redhat.com/rhn/repository/NULL/nfs-utils/0.3.1-6.71/SRPMS/nfs-utils-0.3.1-6.71.src.rpm
Missing file
    MD5: 310db07d759fe4e4462ac555d70f47b2
 
iSeries:
ftp://updates.redhat.com/rhn/repository/NULL/nfs-utils/0.3.1-6.71/ppc/nfs-utils-0.3.1-6.71.ppc.rpm
Missing file
    MD5: 5a2f24c883cf5824f0f5c4afc02d7fb1
 
Red Hat Linux 7.1 for pSeries

SRPMS:
ftp://updates.redhat.com/rhn/repository/NULL/nfs-utils/0.3.1-6.71/SRPMS/nfs-utils-0.3.1-6.71.src.rpm
Missing file
    MD5: 310db07d759fe4e4462ac555d70f47b2
 
pSeries:
ftp://updates.redhat.com/rhn/repository/NULL/nfs-utils/0.3.1-6.71/ppc/nfs-utils-0.3.1-6.71.ppc.rpm
Missing file
    MD5: 5a2f24c883cf5824f0f5c4afc02d7fb1
 
Red Hat Linux 7.2

SRPMS:
ftp://updates.redhat.com/rhn/repository/NULL/nfs-utils/0.3.1-14.72/SRPMS/nfs-utils-0.3.1-14.72.src.rpm
Missing file
    MD5: 0a1a9674ae946f9968790343ad014285
 
IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/nfs-utils/0.3.1-14.72/i386/nfs-utils-0.3.1-14.72.i386.rpm
Missing file
    MD5: 332ca9cabfee2fd3f119bf4b0526685c
 
IA-64:
ftp://updates.redhat.com/rhn/repository/NULL/nfs-utils/0.3.1-14.72/ia64/nfs-utils-0.3.1-14.72.ia64.rpm
Missing file
    MD5: d672f188bb53273e9148acaecb3bdd37
 
Red Hat Linux 7.3

SRPMS:
ftp://updates.redhat.com/rhn/repository/NULL/nfs-utils/0.3.3-6.73/SRPMS/nfs-utils-0.3.3-6.73.src.rpm
Missing file
    MD5: 6d5107a412655f7b4b65434c906673f7
 
IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/nfs-utils/0.3.3-6.73/i386/nfs-utils-0.3.3-6.73.i386.rpm
Missing file
    MD5: 3462808562e694d4e0c86df5340f8337
 
Red Hat Linux 8.0

IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/nfs-utils/1.0.1-2.80/i386/nfs-utils-1.0.1-2.80.i386.rpm
Missing file
    MD5: cce23fd6a17e8304b0c9bfad097ae45f
 
Red Hat Linux 9

SRPMS:
ftp://updates.redhat.com/rhn/repository/NULL/nfs-utils/1.0.1-3.9/SRPMS/nfs-utils-1.0.1-3.9.src.rpm
Missing file
    MD5: 0dcc44660e89ff09dd22b680b9ec28ca
 
IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/nfs-utils/1.0.1-3.9/i386/nfs-utils-1.0.1-3.9.i386.rpm
Missing file
    MD5: cf5c65a715751de995fe33546e4b57a6
 

References


Keywords

DoS, mountd


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/