SuSE Security Advisory: 2.2beta47 within nkita

SuSE Security Announcement

Package: nfs-server < 2.2beta47 within nkita
Date: Fri, 12 Nov 1999 02:12:50 GMT

Affected SuSE versions: all
Vulnerability Type: remote root compromise
SuSE default package: yes (not activated by default)
Other affected systems: all linux systems using the nfs-server

A security hole was discovered in the package mentioned above.
Please update as soon as possible or disable the service if you are
using this software on your SuSE Linux installation(s).

Other Linux distributions or operating systems might be affected
as well, please contact your vendor for information about this

Please note, that that we provide this information on “as-is”
basis only. There is no warranty whatsoever and no liability for
any direct, indirect or incidental damage arising from this
information or the installation of the update package.

1. Problem Description

The rpc.nfsd which is part of the nfs-server package was found
to have two remote vulnerabilities.

2. Impact

Via a buffer overflow, remote root access can be achieved. Write
access to the local filesystem which is exported is necessary.
Another security problem are improper root_sqash export

3. Solution

Updated the package from our FTP server.

Please verify these md5 checksums of the updates before




You can find updates on our ftp-Server:

for Intel processors
for Alpha processors

or try the following web pages for a list of mirrors:

Our webpage for patches:

Our webpage for security announcements:

If you want to report vulnerabilities, please contact [email protected]

SuSE has got two free security mailing list services to which
any interested party may subscribe:

[email protected] – moderated and for general/linux/SuSE
security discussions. All SuSE security announcements are send to
this list.

[email protected] – SuSE’s announce-only mailing
list. Only SuSE’s security annoucements are sent to this list.

To subscribe to the list, send a message to:

To remove your address from the list, send a message to:

Send mail to the following for info and FAQ for this list:

This information is provided freely to everyone interested and
may be redistributed provided that it is not altered in any

Type Bits/KeyID    Date       User ID
pub  2048/3D25D3D9 1999/03/06 SuSE Security Team