In nbd-server in nbd before 3.24, there is a stack-based...
Critical severity
Unreviewed
Published
Mar 7, 2022
to the GitHub Advisory Database
•
Updated Feb 13, 2024
Description
Published by the National Vulnerability Database
Mar 6, 2022
Published to the GitHub Advisory Database
Mar 7, 2022
Last updated
Feb 13, 2024
In nbd-server in nbd before 3.24, there is a stack-based buffer overflow. An attacker can cause a buffer overflow in the parsing of the name field by sending a crafted NBD_OPT_INFO or NBD_OPT_GO message with an large value as the length of the name.
References