#9284: Vulnerabilities in rpcbind and libtirpc
--------------------+-------------------------
Reporter: ken@… | Owner: blfs-book@…
Type: defect | Status: new
Priority: high | Milestone: 8.1
Component: BOOK | Version: SVN
Severity: normal | Keywords:
--------------------+-------------------------
This one had passed me by. CVE-2017-8779 rpcbind through 0.2.4, LIBTIRPC
through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, [ and NTIRPC through 1.4.3 ]
do not consider the maximum RPC data size during memory allocation for XDR
strings, which allows remote attackers to cause a denial of service
(memory consumption with no subsequent free) via a crafted UDP packet to
port 111, aka rpcbomb.
Patches for rpcbind and libtirpc at
https://github.com/guidovranken/rpcbomb - I see that both Fedora and Arch
seem to be using these. The rpcbind part can probably be done by a sed.
--
Ticket URL: <http://wiki.linuxfromscratch.org/blfs/ticket/9284>
BLFS Trac <http://wiki.linuxfromscratch.org/blfs>
Beyond Linux From Scratch
--
http://lists.linuxfromscratch.org/listinfo/blfs-book
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page