Show plain JSON{"id": "CVE-2011-0530", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2011-02-22T19:00:00.940", "references": [{"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=611187", "source": "secalert@redhat.com"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054071.html", "tags": ["Patch"], "source": "secalert@redhat.com"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054083.html", "tags": ["Patch"], "source": "secalert@redhat.com"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html", "source": "secalert@redhat.com"}, {"url": "http://openwall.com/lists/oss-security/2011/01/28/3", "tags": ["Patch"], "source": "secalert@redhat.com"}, {"url": "http://openwall.com/lists/oss-security/2011/01/31/7", "tags": ["Patch"], "source": "secalert@redhat.com"}, {"url": "http://secunia.com/advisories/43353", "tags": ["Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "http://secunia.com/advisories/43610", "source": "secalert@redhat.com"}, {"url": "http://security.gentoo.org/glsa/glsa-201206-35.xml", "source": "secalert@redhat.com"}, {"url": "http://www.debian.org/security/2011/dsa-2183", "source": "secalert@redhat.com"}, {"url": "http://www.securityfocus.com/bid/46572", "source": "secalert@redhat.com"}, {"url": "http://www.vupen.com/english/advisories/2011/0403", "tags": ["Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "http://www.vupen.com/english/advisories/2011/0582", "source": "secalert@redhat.com"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=673562", "tags": ["Patch"], "source": "secalert@redhat.com"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65720", "source": "secalert@redhat.com"}, {"url": "https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8", "tags": ["Patch"], "source": "secalert@redhat.com"}, {"url": "https://hermes.opensuse.org/messages/8086846", "source": "secalert@redhat.com"}, {"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=611187", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054071.html", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054083.html", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://openwall.com/lists/oss-security/2011/01/28/3", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://openwall.com/lists/oss-security/2011/01/31/7", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/43353", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/43610", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://security.gentoo.org/glsa/glsa-201206-35.xml", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.debian.org/security/2011/dsa-2183", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/46572", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2011/0403", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2011/0582", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=673562", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65720", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://hermes.opensuse.org/messages/8086846", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-119"}]}], "descriptions": [{"lang": "en", "value": "Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression."}, {"lang": "es", "value": "Desbordamiento de b\u00fafer en la funci\u00f3n mainloop en NBD-server.c en Network Block Device (nbd) antes de v2.9.20 podr\u00eda permitir a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una solicitud extensa. NOTA: este problema existe debido a una regresi\u00f3n CVE-2005-3534."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:wouter_verhelst:nbd:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "344B1EE6-E6C8-4554-9796-92EB76E36803", "versionEndIncluding": "2.9.19"}, {"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7FB56984-E060-4C2C-9B41-D46F75C6C40D"}, {"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "17AA20F1-CEE5-4768-837F-845B25A7F8EC"}, {"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4C82F9D-3BEE-482D-8F83-1237EA6BA02A"}, {"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "24E3411A-8602-4F5B-A9F1-7137D8F94971"}, {"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DBF449CE-4E34-44AD-862D-B2BAD7C791A1"}, {"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6DB987D9-1A61-4817-AD2A-D3CCD9D65FE5"}, {"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08C9410A-65DF-4095-85AF-D3AED4B8DBEA"}, {"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D6E18B35-771D-4F90-B255-66799D1F4B05"}, {"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0EAC7C30-4702-42EF-B5B8-657C562C4AAD"}, {"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "391B2B7C-D466-4C40-A2FB-8BB405BAF79A"}, {"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9AC011DE-6DA8-45C5-8DEE-65C9634AE61A"}, {"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C074B157-E482-43D5-B23C-6447667AA862"}, {"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "14D7CAD7-11EF-45E4-9B5C-C0CB509DD5FB"}, {"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0E019AE8-04B6-4A3C-8D0D-CD5F8A6CC538"}, {"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3AB8A80B-07DC-4B7C-BD79-6CC5838703AD"}, {"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A805944-8202-45DA-B60D-1A4748381934"}, {"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D7FBADED-4469-4695-A930-F359359FCA1C"}, {"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "540E491B-7BDA-41A2-80AE-1BBC334083BC"}, {"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.18:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "096FF02B-91BF-4412-B9C5-A72F790BA87C"}], "operator": "OR"}]}], "sourceIdentifier": "secalert@redhat.com"}