GLSA Advocate
![Advocate Advocate](/images/ranks/rank-G-1-advocate.gif)
Joined: 12 May 2004 Posts: 2663
|
Posted: Tue Jul 11, 2017 4:26 am Post subject: [ GLSA 201706-07 ] Libtirpc and RPCBind |
|
|
Gentoo Linux Security Advisory
Title: Libtirpc and RPCBind: Denial of Service (GLSA 201706-07)
Severity: normal
Exploitable: remote
Date: 2017-06-06
Bug(s): #617472
ID: 201706-07
Synopsis
A vulnerability has been found in Libtirpc and RPCBind which may
allow a remote attacker to cause a Denial of Service condition.
Background
The RPCBind utility is a server that converts RPC program numbers into
universal addresses.
Libtirpc is a port of Suns Transport-Independent RPC library to Linux.
Affected Packages
Package: net-nds/rpcbind
Vulnerable: < 0.2.4-r1
Unaffected: >= 0.2.4-r1
Architectures: All supported architectures
Package: net-libs/libtirpc
Vulnerable: < 1.0.1-r1
Unaffected: >= 1.0.1-r1
Architectures: All supported architectures
Description
It was found that due to the way RPCBind uses libtirpc (libntirpc), a
memory leak can occur when parsing specially crafted XDR messages.
Impact
A remote attacker could send thousands of messages to RPCBind, possibly
resulting in a Denial of Service condition.
Workaround
There is no known workaround at this time.
Resolution
All RPCBind users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=net-nds/rpcbind-0.2.4-r1"
| All Libtirpc users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=net-libs/libtirpc-1.0.1-r1"
|
References
CVE-2017-8779 |
|