Description
rpc.mountd on Linux, Ultrix, and possibly other operating systems, allows remote attackers to determine the existence of a file on the server by attempting to mount that file, which generates different error messages depending on whether the file exists or not.
Product(s):
- Digital Ultrix
- Digital Equipment Corporation Ultrix
- Linux Kernel 2.6.20.1
- NetBSD 2.0.4
- OpenBSD OpenBSD
- OpenBSD
- OpenBSD 2.0
- OpenBSD 2.1
- OpenBSD 2.2
- OpenBSD 2.3
- OpenBSD 2.4
- OpenBSD 2.5
- OpenBSD 2.6
- OpenBSD 2.7
- OpenBSD 2.8
- OpenBSD 2.9
- OpenBSD 3.0
- OpenBSD 3.1
- OpenBSD 3.2
- OpenBSD 3.3
- OpenBSD 3.4
- OpenBSD 3.5
- OpenBSD 3.6
- OpenBSD 3.7
- OpenBSD 3.8
- OpenBSD 3.9
- OpenBSD 4.0
- OpenBSD 4.1
- OpenBSD 4.2
- OpenBSD 4.3
- OpenBSD 4.4
- OpenBSD 4.5
- OpenBSD 4.6
- OpenBSD 4.7
- OpenBSD 4.8
- OpenBSD 4.9
- OpenBSD 5.0
- OpenBSD 5.1
- OpenBSD 5.2
- OpenBSD 5.3
- OpenBSD 5.4
- OpenBSD 5.5
- Openbsd Openbsd 5.6
- OpenBSD 5.7
- OpenBSD 5.8
- OpenBSD 5.9
- OpenBSD 6.0
- OpenBSD 6.1
- OpenBSD 6.2
- OpenBSD 6.3
- OpenBSD 6.4
- OpenBSD 6.5
- OpenBSD 6.6
- OpenBSD 6.7
- OpenBSD OpenBSD 6.9
- OpenBSD OpenBSD 7.0
- OpenBSD 7.1
- OpenBSD 7.2
- OpenBSD 7.3
- OpenBSD 7.3
- OpenBSD 7.3 Errata 001
- OpenBSD 7.3 Errata 002
- OpenBSD 7.3 Errata 003
- OpenBSD 7.3 Errata 004
- OpenBSD 7.3 Errata 005
- OpenBSD 7.3 Errata 006
- OpenBSD 7.3 Errata 007
- OpenBSD 7.3 Errata 008
- OpenBSD 7.3 Errata 009
- OpenBSD 7.3 Errata 010
- OpenBSD 7.3 Errata 011
- OpenBSD 7.3 Errata 012
- OpenBSD 7.3 Errata 013
- OpenBSD 7.3 Errata 014
- OpenBSD 7.3 Errata 015
- OpenBSD 7.3 Errata 016
- OpenBSD 7.3 Errata 017
- OpenBSD 8.0
- Sun Solaris
- Sun Solaris 1.0.1
- Sun Solaris 1.0
- Sun Solaris 1.1.1a
- Sun Solaris 1.1.2
- Sun Solaris 1.1.3
- Sun Solaris 1.1.4
- Sun Solaris 1.1
- Sun Solaris 1.1c
- Sun Solaris 1.2
- Sun Solaris 10.0
- Sun Solaris 10.0 for SPARC
- Sun Solaris 10
- Sun Solaris 11.0
- Sun Solaris 11
- Sun Solaris 2.0
- Sun Solaris 2.1
- Sun Solaris 2.2
- Sun Solaris 2.3
- Sun Solaris 2.4
- Sun Solaris 2.5.1
- +28 additional
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-1999-1225, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-1999-1225 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.