Vigil@nce - Linux kernel: denial of service via NFS read_buf
July 2010 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/
SYNTHESIS OF THE VULNERABILITY
When the NFSd service is enabled in the Linux kernel, an
authenticated remote attacker can stop the kernel.
Severity: 2/4
Creation date: 07/07/2010
DESCRIPTION OF THE VULNERABILITY
The fs/nfsd directory of the Linux kernel implements a NFS service.
The read_buf() function of the fs/nfsd/nfs4xdr.c file processes
data received from the client. However, when the page limit is
reached, the argp->end variable is incorrectly set. A read is thus
done at an invalid address, which stops the kernel.
When the NFSd service is enabled in the Linux kernel, an
authenticated remote attacker can therefore stop the kernel.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Linux-kernel-denial-of-service-via-NFS-read-buf-9745