|Number of vulnerabilities||1|
|CVE ID|| CVE-2017-7895
Red Hat Enterprise Linux
|Vulnerable software versions||
Red Hat Enterprise Linux 5.9
|Vendor URL||Red Hat Inc.|
The vulnerability allows a remote attacker to bypass security restrictions on the target system.
The weakness exists due to boundary error when handling a user-supplied input. A remote attacker can send a specially crafted request, trigger pointer-arithmetic errors or possibly have unspecified other impact related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c.
Successful exploitation of the vulnerability results in access to the system.
Install update from vendor's website.External links