Your submission was sent successfully! Close

CVE-2013-6410

Published: 7 December 2013

nbd-server in Network Block Device (nbd) before 3.5 does not properly check IP addresses, which might allow remote attackers to bypass intended access restrictions via an IP address that has a partial match in the authfile configuration file.

Priority

Low

Status

Package Release Status
nbd
Launchpad, Ubuntu, Debian
lucid Ignored
(reached end-of-life)
precise
Released (1:2.9.25-2ubuntu1.1)
quantal Ignored
(reached end-of-life)
raring Ignored
(reached end-of-life)
saucy Ignored
(reached end-of-life)
trusty Not vulnerable
(1:3.7-1)
upstream Needs triage

utopic Not vulnerable
(1:3.7-1)
vivid Not vulnerable
(1:3.7-1)
Patches:
vendor: http://anonscm.debian.org/cgit/users/wouter/nbd.git/commit/?id=0e9bd98c44dd94d9ede92655a36849fbc8cbf5b9
upstream: https://github.com/yoe/nbd/commit/df890c99337a255979e608d71f42401c0cddd5e0
vendor: http://www.debian.org/security/2013/dsa-2806