statd in nfs-utils 1.257 and earlier does not ignore the SIGPIPE signal, which allows remote attackers to cause a denial of service (server process crash) via a TCP connection that is prematurely terminated.
Link | Tags |
---|---|
http://www.debian.org/security/2004/dsa-606 | vendor advisory |
http://www.redhat.com/support/errata/RHSA-2005-014.html | vendor advisory |
http://www.redhat.com/support/errata/RHSA-2004-583.html | vendor advisory |
http://www.securityfocus.com/bid/11785 | patch vendor advisory vdb entry |
http://cvs.sourceforge.net/viewcvs.py/nfs/nfs-utils/ChangeLog?rev=1.258&view=markup | |
http://www.securityfocus.com/archive/1/426072/30/6740/threaded | vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10899 | signature vdb entry |
https://www.ubuntu.com/usn/usn-36-1/ | vendor advisory |
http://www.trustix.org/errata/2004/0065/ | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/18332 | vdb entry |