Mandriva Linux Security Advisory : nfs-utils (MDVSA-2013:178)

This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.


Synopsis :

The remote Mandriva Linux host is missing one or more security
updates.

Description :

Updated nfs-utils packages fix security vulnerability

It was reported that rpc.gssd in nfs-utils is vulnerable to DNS
spoofing due to it depending on PTR resolution for GSSAPI
authentication. Because of this, if a user where able to poison DNS to
a victim's computer, they would be able to trick rpc.gssd into talking
to another server (perhaps with less security) than the intended
server (with stricter security). If the victim has write access to the
second (less secure) server, and the attacker has read access (when
they normally might not on the secure server), the victim could write
files to that server, which the attacker could obtain (when normally
they would not be able to). To the victim this is transparent because
the victim's computer asks the KDC for a ticket to the second server
due to reverse DNS resolution; in this case Krb5 authentication does
not fail because the victim is talking to the correct server
(CVE-2013-1923).

See also :

http://advisories.mageia.org/MGASA-2013-0178.html

Solution :

Update the affected nfs-utils and / or nfs-utils-clients packages.

Risk factor :

Low / CVSS Base Score : 3.2
(CVSS2#AV:A/AC:H/Au:N/C:P/I:P/A:N)
CVSS Temporal Score : 2.8
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Mandriva Local Security Checks

Nessus Plugin ID: 66978 ()

Bugtraq ID: 58854

CVE ID: CVE-2013-1923

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now