CVE-2017-8779
04.05.2017, 14:29
rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb.Enginsight
| Vendor | Product | Version |
|---|---|---|
| rpcbind_project | rpcbind | 𝑥 ≤ 0.2.4 |
| libtirpc_project | libtirpc | 𝑥 ≤ 1.0.1 |
| ntirpc_project | ntirpc | 𝑥 ≤ 1.4.3 |
𝑥
= Vulnerable software versions
Debian Releases
Debian Product | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| libtirpc |
| ||||||||||
| ntirpc |
| ||||||||||
| rpcbind |
|
Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| libtirpc |
| ||||||||||||||||||||||||||||||||||||||
| ntirpc |
| ||||||||||||||||||||||||||||||||||||||
| rpcbind |
|
References