Vulnerabilities > CVE-2006-5780 - Stack Buffer Overflow vulnerability in Xlink Technology Omni-Nfs Server 5.2
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Stack-based buffer overflow in nfsd.exe in XLink Omni-NFS Server 5.2 allows remote attackers to execute arbitrary code via a crafted TCP packet to port 2049 (nfsd), as demonstrated by vd_xlink.pm.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description Omni-NFS Server Buffer Overflow. CVE-2006-5780. Remote exploit for windows platform id EDB-ID:16389 last seen 2016-02-01 modified 2010-11-11 published 2010-11-11 reporter metasploit source https://www.exploit-db.com/download/16389/ title Omni-NFS Server Buffer Overflow description Omni-NFS Server 5.2 (nfsd.exe) Remote Stack Overflow Exploit (meta). CVE-2006-5780. Remote exploit for windows platform file exploits/windows/remote/2729.pm id EDB-ID:2729 last seen 2016-01-31 modified 2006-11-06 platform windows port 2049 published 2006-11-06 reporter Evgeny Legerov source https://www.exploit-db.com/download/2729/ title Omni-NFS Server 5.2 nfsd.exe Remote Stack Overflow Exploit meta type remote
Metasploit
description | This module exploits a stack buffer overflow in Xlink Omni-NFS Server 5.2 When sending a specially crafted nfs packet, an attacker may be able to execute arbitrary code. |
id | MSF:EXPLOIT/WINDOWS/NFS/XLINK_NFSD |
last seen | 2019-12-17 |
modified | 2017-07-24 |
published | 2009-10-03 |
references | |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/nfs/xlink_nfsd.rb |
title | Omni-NFS Server Buffer Overflow |
References
- http://gleg.net/downloads/VULNDISCO_META_FREE.tar.gz
- http://gleg.net/vulndisco_meta.shtml
- http://secunia.com/advisories/22751
- http://securityreason.com/securityalert/1831
- http://securitytracker.com/id?1017172
- http://www.securityfocus.com/archive/1/450728/100/0/threaded
- http://www.securityfocus.com/bid/20941
- http://www.vupen.com/english/advisories/2006/4380
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30083
- https://www.exploit-db.com/exploits/2729