Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2011.0107 NetWare XNFS security update 25 November 2011 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: XNFS Server Operating System: Netware Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2011-4191 Member content until: Sunday, December 25 2011 Reference: ESB-2011.0217 OVERVIEW A vulnerability has been corrected in the XNFS server component of Novell NetWare 6.5. [1] IMPACT Novell lists the vulnerability as a stack-based buffer overflow that does not require authentication to exploit (CVE-2011-4191). "This vulnerability allows XNFS.NLM's stack buffer to be exceeded by certain oversized incoming packets, when the information sent is processed by XNFS's xdrDecodeString function. This potentially results in processor faults, abends, or execution of arbitary code (for example, due to corrupted code pointers in the stack). Authentication is not required to exploit this vulnerability. A remote attacker can exploit this vulnerability to alter the process's instruction pointer, or to abend XNFS processes. After 3 of these abends, NFS services become unresponsive." [1] MITIGATION Novell has released a patch (xnfs8d.zip) to correct the vulnerability. For instructions on installing the patch as well as details of previous patches included in this file visit the Novell website. [1] REFERENCES [1] NetWare XNFS security updates - Nov 2011 http://download.novell.com/Download?buildid=Cfw1tDezgbw~ AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBTs7Yr+4yVqjM2NGpAQJEYg//YAmD9zJbF9teIblQARG1gB6uM/31O5BQ 6Cuhx0dauajguyhWTzhSn+N2UNfSEN0GgW0ycd6suODGYIqS5D3nKE++dDI55H5B xANxHRPG9cQCCBT9T4OzbBPDQGswBicdGfU6B0hi27Fd934k85AMlHhId/J5+c3O iZzcS+IKIzXlS8YtTk9Yn7j9uzu5t9b9RoRYCSgPPDh7FP+wfu64k58LChy3p9eD MYS/eXwr/lx1DHVC8QGuE8MfM8HJ3abG4jUVQCEjrJa/Ck5Smp96t6Rw76iYzXuH zYJbosF+1IjhrzNUhBV+eOnK4IV8eAVXcFhP+rX7PrGPRYeLOHDec87Tt9d4DD3h Dd0vMN0pGlWJCu6PK9/N6nucijaGd1Qo+CGcihfzY/7/Hv9YScV5ALxNKkNmXXia txGi63Ly41Q1d74qgxswsTc4sQpgTGEIArmoLUDYc+rxt9RSufVvQ2CePp2dzQzp LKMKUO5D829jYz+d5r3v+X8jcPmoB/IAdc03izopJVVBblBevLjU4Y95s6Hc4MXc n2xeP+igjFFVDpCXCXYw82AO/UiJwuJ5Ud2eovVhhVzjayAm+m+I6fIuGM2f0One qVx/wG5n3wXDmtoUHszAxcd8VXMP6bs6GrRhoDclv8dVAhWAk85hwCbOaZEIDhTu sZ7omIs/03o= =tfEs -----END PGP SIGNATURE-----