CVE-2013-6410
07.12.2013, 20:55
nbd-server in Network Block Device (nbd) before 3.5 does not properly check IP addresses, which might allow remote attackers to bypass intended access restrictions via an IP address that has a partial match in the authfile configuration file.Enginsight
Vendor | Product | Version |
---|---|---|
wouter_verhelst | nbd | 𝑥 ≤ 3.4 |
wouter_verhelst | nbd | 2.7.5 |
wouter_verhelst | nbd | 2.8.0 |
wouter_verhelst | nbd | 2.8.2 |
wouter_verhelst | nbd | 2.8.4 |
wouter_verhelst | nbd | 2.8.5 |
wouter_verhelst | nbd | 2.8.6 |
wouter_verhelst | nbd | 2.8.7 |
wouter_verhelst | nbd | 2.9.0 |
wouter_verhelst | nbd | 2.9.1 |
wouter_verhelst | nbd | 2.9.2 |
wouter_verhelst | nbd | 2.9.3 |
wouter_verhelst | nbd | 2.9.4 |
wouter_verhelst | nbd | 2.9.5 |
wouter_verhelst | nbd | 2.9.6 |
wouter_verhelst | nbd | 2.9.7 |
wouter_verhelst | nbd | 2.9.8 |
wouter_verhelst | nbd | 2.9.9 |
wouter_verhelst | nbd | 2.9.10 |
wouter_verhelst | nbd | 2.9.11 |
wouter_verhelst | nbd | 2.9.12 |
wouter_verhelst | nbd | 2.9.13 |
wouter_verhelst | nbd | 2.9.14 |
wouter_verhelst | nbd | 2.9.15 |
wouter_verhelst | nbd | 2.9.16 |
wouter_verhelst | nbd | 2.9.17 |
wouter_verhelst | nbd | 2.9.18 |
wouter_verhelst | nbd | 2.9.19 |
wouter_verhelst | nbd | 2.9.20 |
wouter_verhelst | nbd | 2.9.21 |
wouter_verhelst | nbd | 2.9.22 |
wouter_verhelst | nbd | 2.9.23 |
wouter_verhelst | nbd | 2.9.24 |
wouter_verhelst | nbd | 2.9.25 |
wouter_verhelst | nbd | 3.0 |
wouter_verhelst | nbd | 3.1 |
wouter_verhelst | nbd | 3.1.1 |
wouter_verhelst | nbd | 3.2 |
wouter_verhelst | nbd | 3.3 |
debian | debian_linux | 6.0 |
debian | debian_linux | 7.0 |
canonical | ubuntu_linux | 12.04 |
canonical | ubuntu_linux | 14.04 |
canonical | ubuntu_linux | 14.10 |
canonical | ubuntu_linux | 15.04 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References