Computer Security
[EN] securityvulns.ru no-pyccku


FreeBSD NFS privilege escalation
Published:29.07.2013
Source:
SecurityVulns ID:13224
Type:remote
Threat Level:
6/10
Description:It's possible to access files with credentials of any user if anonymous NFS acccess is allowed.
Affected:FREEBSD : FreeBSD 8.3
 FREEBSD : FreeBSD 9.1
CVE:CVE-2013-4851 (The vfs_hang_addrlist function in sys/kern/vfs_export.c in the NFS server implementation in the kernel in FreeBSD 8.3 and 9.x through 9.1-RELEASE-p5 controls authorization for host/subnet export entries on the basis of group information sent by the client, which allows remote attackers to bypass file permissions on NFS filesystems via crafted requests.)
Original documentdocumentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-13:08.nfsserver (29.07.2013)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod