Stack-based buffer overflow in nbd - CVE-2022-26496
Published: March 22, 2022 / Updated: May 7, 2023
nbd
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing NBD_OPT_INFO or NBD_OPT_GO messages. A remote unauthenticated attacker can pass specially crafted data to the application, trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
How to mitigate CVE-2022-26496
Sources
- https://sourceforge.net/projects/nbd/files/nbd/
- https://lists.debian.org/nbd/2022/01/msg00037.html
- https://lists.debian.org/nbd/2022/01/msg00036.html
- https://www.debian.org/security/2022/dsa-5100
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZHR73XMAJTCFGKUZRXVTZKCK2X3IFNA/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU5JFD4PEJED72TZLZ5R2Q2SFXICU5I5/
- https://packetstormsecurity.com/files/download/172148/GS20230504144557.txt