SUSE-SA:2006:005: nfs-server

high Nessus Plugin ID 20821
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote host is missing a vendor-supplied security patch


The remote host is missing the patch for the advisory SUSE-SA:2006:005 (nfs-server).

An remotely exploitable problem exists in the rpc.mountd service in the user space NFS server package 'nfs-server'.

Insufficient buffer space supplied to the realpath() function when processing mount requests can lead to a buffer overflow in the rpc.mountd and allows remote attackers to execute code as the root user.

Code execution is definitely possible if the attacker can create symlinks on any of the file systems on the machine running rpc.mountd (/tmp , /home/attacker or similar).
For attackers without filesystem access code execution is potentially possible.

The 'nfs-server' package is obsolete and has been replaced by the 'nfs-utils' package (kernel NFS server) in all currently supported SUSE Linux products already and is only included for completeness.
The 'nfs-utils' package itself is NOT affected by this problem.

This issue is tracked by the Mitre CVE ID CVE-2006-0043.


Plugin Details

Severity: High

ID: 20821

File Name: suse_SA_2006_005.nasl

Version: 1.9

Agent: unix

Published: 1/29/2006

Updated: 1/14/2021

Dependencies: ssh_get_info.nasl

Vulnerability Information

Required KB Items: Host/SuSE/rpm-list