CVE-2017-8779

rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb.
References
Link Resource
http://openwall.com/lists/oss-security/2017/05/03/12 Mailing List Patch Third Party Advisory
http://openwall.com/lists/oss-security/2017/05/04/1 Mailing List Patch Third Party Advisory
http://www.debian.org/security/2017/dsa-3845
http://www.securityfocus.com/bid/98325 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1038532
https://access.redhat.com/errata/RHBA-2017:1497
https://access.redhat.com/errata/RHSA-2017:1262
https://access.redhat.com/errata/RHSA-2017:1263
https://access.redhat.com/errata/RHSA-2017:1267
https://access.redhat.com/errata/RHSA-2017:1268
https://access.redhat.com/errata/RHSA-2017:1395
https://github.com/drbothen/GO-RPCBOMB Issue Tracking Patch Third Party Advisory
https://github.com/guidovranken/rpcbomb/ Issue Tracking Patch Third Party Advisory
https://guidovranken.wordpress.com/2017/05/03/rpcbomb-remote-rpcbind-denial-of-service-patches/ Third Party Advisory
https://security.gentoo.org/glsa/201706-07
https://security.netapp.com/advisory/ntap-20180109-0001/
https://usn.ubuntu.com/3759-1/
https://usn.ubuntu.com/3759-2/
https://www.exploit-db.com/exploits/41974/
http://openwall.com/lists/oss-security/2017/05/03/12 Mailing List Patch Third Party Advisory
http://openwall.com/lists/oss-security/2017/05/04/1 Mailing List Patch Third Party Advisory
http://www.debian.org/security/2017/dsa-3845
http://www.securityfocus.com/bid/98325 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1038532
https://access.redhat.com/errata/RHBA-2017:1497
https://access.redhat.com/errata/RHSA-2017:1262
https://access.redhat.com/errata/RHSA-2017:1263
https://access.redhat.com/errata/RHSA-2017:1267
https://access.redhat.com/errata/RHSA-2017:1268
https://access.redhat.com/errata/RHSA-2017:1395
https://github.com/drbothen/GO-RPCBOMB Issue Tracking Patch Third Party Advisory
https://github.com/guidovranken/rpcbomb/ Issue Tracking Patch Third Party Advisory
https://guidovranken.wordpress.com/2017/05/03/rpcbomb-remote-rpcbind-denial-of-service-patches/ Third Party Advisory
https://security.gentoo.org/glsa/201706-07
https://security.netapp.com/advisory/ntap-20180109-0001/
https://usn.ubuntu.com/3759-1/
https://usn.ubuntu.com/3759-2/
https://www.exploit-db.com/exploits/41974/
Configurations

Configuration 1 (hide)

cpe:2.3:a:rpcbind_project:rpcbind:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:libtirpc_project:libtirpc:*:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:ntirpc_project:ntirpc:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:34

Type Values Removed Values Added
References () http://openwall.com/lists/oss-security/2017/05/03/12 - Mailing List, Patch, Third Party Advisory () http://openwall.com/lists/oss-security/2017/05/03/12 - Mailing List, Patch, Third Party Advisory
References () http://openwall.com/lists/oss-security/2017/05/04/1 - Mailing List, Patch, Third Party Advisory () http://openwall.com/lists/oss-security/2017/05/04/1 - Mailing List, Patch, Third Party Advisory
References () http://www.debian.org/security/2017/dsa-3845 - () http://www.debian.org/security/2017/dsa-3845 -
References () http://www.securityfocus.com/bid/98325 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/98325 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1038532 - () http://www.securitytracker.com/id/1038532 -
References () https://access.redhat.com/errata/RHBA-2017:1497 - () https://access.redhat.com/errata/RHBA-2017:1497 -
References () https://access.redhat.com/errata/RHSA-2017:1262 - () https://access.redhat.com/errata/RHSA-2017:1262 -
References () https://access.redhat.com/errata/RHSA-2017:1263 - () https://access.redhat.com/errata/RHSA-2017:1263 -
References () https://access.redhat.com/errata/RHSA-2017:1267 - () https://access.redhat.com/errata/RHSA-2017:1267 -
References () https://access.redhat.com/errata/RHSA-2017:1268 - () https://access.redhat.com/errata/RHSA-2017:1268 -
References () https://access.redhat.com/errata/RHSA-2017:1395 - () https://access.redhat.com/errata/RHSA-2017:1395 -
References () https://github.com/drbothen/GO-RPCBOMB - Issue Tracking, Patch, Third Party Advisory () https://github.com/drbothen/GO-RPCBOMB - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/guidovranken/rpcbomb/ - Issue Tracking, Patch, Third Party Advisory () https://github.com/guidovranken/rpcbomb/ - Issue Tracking, Patch, Third Party Advisory
References () https://guidovranken.wordpress.com/2017/05/03/rpcbomb-remote-rpcbind-denial-of-service-patches/ - Third Party Advisory () https://guidovranken.wordpress.com/2017/05/03/rpcbomb-remote-rpcbind-denial-of-service-patches/ - Third Party Advisory
References () https://security.gentoo.org/glsa/201706-07 - () https://security.gentoo.org/glsa/201706-07 -
References () https://security.netapp.com/advisory/ntap-20180109-0001/ - () https://security.netapp.com/advisory/ntap-20180109-0001/ -
References () https://usn.ubuntu.com/3759-1/ - () https://usn.ubuntu.com/3759-1/ -
References () https://usn.ubuntu.com/3759-2/ - () https://usn.ubuntu.com/3759-2/ -
References () https://www.exploit-db.com/exploits/41974/ - () https://www.exploit-db.com/exploits/41974/ -

Information

Published : 2017-05-04 14:29

Updated : 2024-11-21 03:34


NVD link : CVE-2017-8779

Mitre link : CVE-2017-8779

CVE.ORG link : CVE-2017-8779


JSON object : View

Products Affected

libtirpc_project

  • libtirpc

rpcbind_project

  • rpcbind

ntirpc_project

  • ntirpc
CWE
CWE-770

Allocation of Resources Without Limits or Throttling