Date: Tue, 30 Apr 2013 00:50:24 +0200 From: =?utf-8?Q?Dag-Erling_Sm=C3=B8rgrav?= <des@des.no> To: Kevin Day <toasty@dragondata.com> Cc: freebsd-security@freebsd.org Subject: Re: FreeBSD Security Advisory FreeBSD-SA-13:05.nfsserver [REVISED] Message-ID: <86zjwh9cjz.fsf@nine.des.no> In-Reply-To: <EFA0F554-54AC-42DC-9253-49BB5FCE7AB3@dragondata.com> (Kevin Day's message of "Mon, 29 Apr 2013 17:46:45 -0500") References: <201304292156.r3TLuoGP052344@freefall.freebsd.org> <EFA0F554-54AC-42DC-9253-49BB5FCE7AB3@dragondata.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Kevin Day <toasty@dragondata.com> writes: > Can someone clarify if this is exploitable only from hosts/networks > allowed in /etc/exports? i.e. if exports would not allow an attacker > to mount a filesystem, would they still be able to exploit this? I thought that was self-explanatory - the attacker must first mount the filesystem. DES --=20 Dag-Erling Sm=C3=B8rgrav - des@des.no
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?86zjwh9cjz.fsf>