Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 30 Apr 2013 00:50:24 +0200
From:      =?utf-8?Q?Dag-Erling_Sm=C3=B8rgrav?= <des@des.no>
To:        Kevin Day <toasty@dragondata.com>
Cc:        freebsd-security@freebsd.org
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-13:05.nfsserver [REVISED]
Message-ID:  <86zjwh9cjz.fsf@nine.des.no>
In-Reply-To: <EFA0F554-54AC-42DC-9253-49BB5FCE7AB3@dragondata.com> (Kevin Day's message of "Mon, 29 Apr 2013 17:46:45 -0500")
References:  <201304292156.r3TLuoGP052344@freefall.freebsd.org> <EFA0F554-54AC-42DC-9253-49BB5FCE7AB3@dragondata.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Kevin Day <toasty@dragondata.com> writes:
> Can someone clarify if this is exploitable only from hosts/networks
> allowed in /etc/exports? i.e. if exports would not allow an attacker
> to mount a filesystem, would they still be able to exploit this?

I thought that was self-explanatory - the attacker must first mount the
filesystem.

DES
--=20
Dag-Erling Sm=C3=B8rgrav - des@des.no



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?86zjwh9cjz.fsf>