CVE-2017-8779
04.05.2017, 14:29
rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb.Enginsight
Vendor | Product | Version |
---|---|---|
rpcbind_project | rpcbind | 𝑥 ≤ 0.2.4 |
libtirpc_project | libtirpc | 𝑥 ≤ 1.0.1 |
ntirpc_project | ntirpc | 𝑥 ≤ 1.4.3 |
𝑥
= Vulnerable software versions

Debian Releases
Debian Product | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
libtirpc |
| ||||||||||
ntirpc |
| ||||||||||
rpcbind |
|

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
libtirpc |
| ||||||||||||||||||||||||||||||||||||||
ntirpc |
| ||||||||||||||||||||||||||||||||||||||
rpcbind |
|
References