CVE-2025-47711
- EPSS 0.06%
- Published 09.06.2025 06:03:47
- Last modified 26.08.2025 16:26:35
There's a flaw in the nbdkit server when handling responses from its plugins regarding the status of data blocks. If a client makes a specific request for a very large data range, and a plugin responds with an even larger single block, the nbdkit ser...
CVE-2025-47712
- EPSS 0.06%
- Published 09.06.2025 05:58:41
- Last modified 21.08.2025 01:19:08
A flaw exists in the nbdkit "blocksize" filter that can be triggered by a specific type of client request. When a client requests block status information for a very large data range, exceeding a certain limit, it causes an internal error in the nbdk...
CVE-2021-3716
- EPSS 0.05%
- Published 02.03.2022 23:15:09
- Last modified 21.11.2024 06:22:14
A flaw was found in nbdkit due to to improperly caching plaintext state across the STARTTLS encryption boundary. A MitM attacker could use this flaw to inject a plaintext NBD_OPT_STRUCTURED_REPLY before proxying everything else a client sends to the ...
CVE-2019-14851
- EPSS 0.33%
- Published 18.03.2021 20:15:12
- Last modified 21.11.2024 04:27:29
A denial of service vulnerability was discovered in nbdkit. A client issuing a certain sequence of commands could possibly trigger an assertion failure, causing nbdkit to exit. This issue only affected nbdkit versions 1.12.7, 1.14.1, and 1.15.1.
CVE-2019-14850
- EPSS 0.4%
- Published 18.03.2021 19:15:12
- Last modified 21.11.2024 04:27:29
A denial of service vulnerability was discovered in nbdkit 1.12.7, 1.14.1 and 1.15.1. An attacker could connect to the nbdkit service and cause it to perform a large amount of work in initializing backend plugins, by simply opening a connection to th...