CVE-2013-6410
07.12.2013, 20:55
nbd-server in Network Block Device (nbd) before 3.5 does not properly check IP addresses, which might allow remote attackers to bypass intended access restrictions via an IP address that has a partial match in the authfile configuration file.Enginsight
| Vendor | Product | Version |
|---|---|---|
| wouter_verhelst | nbd | 𝑥 ≤ 3.4 |
| wouter_verhelst | nbd | 2.7.5 |
| wouter_verhelst | nbd | 2.8.0 |
| wouter_verhelst | nbd | 2.8.2 |
| wouter_verhelst | nbd | 2.8.4 |
| wouter_verhelst | nbd | 2.8.5 |
| wouter_verhelst | nbd | 2.8.6 |
| wouter_verhelst | nbd | 2.8.7 |
| wouter_verhelst | nbd | 2.9.0 |
| wouter_verhelst | nbd | 2.9.1 |
| wouter_verhelst | nbd | 2.9.2 |
| wouter_verhelst | nbd | 2.9.3 |
| wouter_verhelst | nbd | 2.9.4 |
| wouter_verhelst | nbd | 2.9.5 |
| wouter_verhelst | nbd | 2.9.6 |
| wouter_verhelst | nbd | 2.9.7 |
| wouter_verhelst | nbd | 2.9.8 |
| wouter_verhelst | nbd | 2.9.9 |
| wouter_verhelst | nbd | 2.9.10 |
| wouter_verhelst | nbd | 2.9.11 |
| wouter_verhelst | nbd | 2.9.12 |
| wouter_verhelst | nbd | 2.9.13 |
| wouter_verhelst | nbd | 2.9.14 |
| wouter_verhelst | nbd | 2.9.15 |
| wouter_verhelst | nbd | 2.9.16 |
| wouter_verhelst | nbd | 2.9.17 |
| wouter_verhelst | nbd | 2.9.18 |
| wouter_verhelst | nbd | 2.9.19 |
| wouter_verhelst | nbd | 2.9.20 |
| wouter_verhelst | nbd | 2.9.21 |
| wouter_verhelst | nbd | 2.9.22 |
| wouter_verhelst | nbd | 2.9.23 |
| wouter_verhelst | nbd | 2.9.24 |
| wouter_verhelst | nbd | 2.9.25 |
| wouter_verhelst | nbd | 3.0 |
| wouter_verhelst | nbd | 3.1 |
| wouter_verhelst | nbd | 3.1.1 |
| wouter_verhelst | nbd | 3.2 |
| wouter_verhelst | nbd | 3.3 |
| debian | debian_linux | 6.0 |
| debian | debian_linux | 7.0 |
| canonical | ubuntu_linux | 12.04 |
| canonical | ubuntu_linux | 14.04 |
| canonical | ubuntu_linux | 14.10 |
| canonical | ubuntu_linux | 15.04 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Common Weakness Enumeration
References