NFS: Linux Kernel nfsd Heap Buffer Overflow

This signature detects attempts to exploit a known vulnerability against Linux Kernel nfsd. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the Linux Kernel nfsd.

Extended Description

The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Affected Products

Netapp active_iq_unified_manager

References

CVE: CVE-2022-43945

Short Name
NFS:OVERFLOW:LINUX-KERNEL-NSFD
Severity
Major
Recommended
True
Recommended Action
Drop
Category
NFS
Keywords
Buffer CVE-2022-43945 Heap Kernel Linux Overflow nfsd
Release Date
03/03/2023
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3590
False Positive
Unknown
Vendors

Netapp

Linux

Found a potential security threat?