FreeBSD nfsd Malformed NFS Mount Request Remote DoS

high Nessus Plugin ID 20989

Synopsis

The remote host is affected by a denial of service vulnerability.

Description

The NFS server on the remote host appears to be one from FreeBSD that causes a kernel panic when it receives a malformed NFS mount request via TCP. An unauthenticated remote attacker can leverage this flaw to crash the remote host.

Solution

Use a firewall to restrict access to the NFS server or upgrade / patch the affected system as described in the vendor advisory above.

See Also

http://www.nessus.org/u?31514c89

http://www.nessus.org/u?2335c1e7

Plugin Details

Severity: High

ID: 20989

File Name: freebsd_nfsd_dos.nasl

Version: 1.19

Type: remote

Published: 3/1/2006

Updated: 7/11/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: cpe:/o:freebsd:freebsd

Required KB Items: Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2/26/2006

Reference Information

CVE: CVE-2006-0900

BID: 16838