ID CVE-2017-8779
Summary rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb.
References
Vulnerable Configurations
  • cpe:2.3:a:rpcbind_project:rpcbind:0.2.4
    cpe:2.3:a:rpcbind_project:rpcbind:0.2.4
  • libtirpc Project libtirpc 1.0.1
    cpe:2.3:a:libtirpc_project:libtirpc:1.0.1
  • cpe:2.3:a:ntirpc_project:ntirpc:1.4.3
    cpe:2.3:a:ntirpc_project:ntirpc:1.4.3
CVSS
Base: 7.8
Impact:
Exploitability:
CWE CWE-399
CAPEC
exploit-db via4
description RPCBind / libtirpc - Denial of Service. CVE-2017-8779. Dos exploit for Linux platform. Tags: Denial of Service (DoS)
file exploits/linux/dos/41974.rb
id EDB-ID:41974
last seen 2017-05-08
modified 2017-05-08
platform linux
port 111
published 2017-05-08
reporter Exploit-DB
source https://www.exploit-db.com/download/41974/
title RPCBind / libtirpc - Denial of Service
type dos
metasploit via4
description This module exploits a vulnerability in certain versions of rpcbind, LIBTIRPC, and NTIRPC, allowing an attacker to trigger large (and never freed) memory allocations for XDR strings on the target.
id MSF:AUXILIARY/DOS/RPC/RPCBOMB
last seen 2018-09-24
modified 2017-07-24
published 2017-06-05
reliability Normal
reporter Rapid7
source https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/dos/rpc/rpcbomb.rb
title RPC DoS targeting *nix rpcbind/libtirpc
nessus via4
  • NASL family PhotonOS Local Security Checks
    NASL id PHOTONOS_PHSA-2017-0017.NASL
    description An update of [rpcbind,libtirpc,freetype2] packages for PhotonOS has been released.
    last seen 2018-09-01
    modified 2018-08-17
    plugin id 111866
    published 2018-08-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=111866
    title Photon OS 1.0: Freetype2 / Libtirpc / Rpcbind PHSA-2017-0017
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2017-1267.NASL
    description From Red Hat Security Advisory 2017:1267 : An update for rpcbind is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. [Updated 16 June 2017] The packages distributed with this errata have a bug that can cause the rpcbind utility to terminate unexpectedly at start. RHBA-2017:1435 was released on 13 June 2017 to address this issue. The rpcbind utility is a server that converts Remote Procedure Call (RPC) program numbers into universal addresses. It must be running on the host to be able to make RPC calls on a server on that machine. Security Fix(es) : * It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. (CVE-2017-8779)
    last seen 2018-09-06
    modified 2018-09-05
    plugin id 100368
    published 2017-05-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100368
    title Oracle Linux 6 : rpcbind (ELSA-2017-1267)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-3845.NASL
    description Guido Vranken discovered that incorrect memory management in libtirpc, a transport-independent RPC library used by rpcbind and other programs may result in denial of service via memory exhaustion (depending on memory management settings).
    last seen 2018-09-01
    modified 2018-07-10
    plugin id 100029
    published 2017-05-09
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100029
    title Debian DSA-3845-1 : libtirpc - security update
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2017-615.NASL
    description This update for rpcbind fixes the following issues : - CVE-2017-8779: A crafted UDP package could lead rcpbind to remote denial-of-service (bsc#1037559) This update was imported from the SUSE:SLE-12-SP2:Update update project.
    last seen 2018-09-01
    modified 2018-01-26
    plugin id 100447
    published 2017-05-26
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100447
    title openSUSE Security Update : rpcbind (openSUSE-2017-615)
  • NASL family Huawei Local Security Checks
    NASL id EULEROS_SA-2017-1103.NASL
    description According to the version of the rpcbind package installed, the EulerOS installation on the remote host is affected by the following vulnerability : - It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. (CVE-2017-8779) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-09-01
    modified 2018-08-10
    plugin id 100696
    published 2017-06-09
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100696
    title EulerOS 2.0 SP2 : rpcbind (EulerOS-SA-2017-1103)
  • NASL family Huawei Local Security Checks
    NASL id EULEROS_SA-2017-1102.NASL
    description According to the version of the rpcbind package installed, the EulerOS installation on the remote host is affected by the following vulnerability : - It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. (CVE-2017-8779) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-09-01
    modified 2018-08-10
    plugin id 100695
    published 2017-06-09
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100695
    title EulerOS 2.0 SP1 : rpcbind (EulerOS-SA-2017-1102)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2017-1328-1.NASL
    description This update for rpcbind fixes the following issues : - CVE-2017-8779: A crafted UDP package could lead rcpbind to remote denial-of-service (bsc#1037559) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-09-01
    modified 2018-07-31
    plugin id 100289
    published 2017-05-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100289
    title SUSE SLED12 / SLES12 Security Update : rpcbind (SUSE-SU-2017:1328-1)
  • NASL family Amazon Linux Local Security Checks
    NASL id ALA_ALAS-2017-841.NASL
    description It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. (CVE-2017-8779)
    last seen 2018-09-01
    modified 2018-04-18
    plugin id 100642
    published 2017-06-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100642
    title Amazon Linux AMI : rpcbind (ALAS-2017-841)
  • NASL family Amazon Linux Local Security Checks
    NASL id ALA_ALAS-2017-840.NASL
    description Memory leak when failing to parse XDR strings or bytearrays It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. (CVE-2017-8779)
    last seen 2018-09-01
    modified 2018-04-18
    plugin id 100641
    published 2017-06-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100641
    title Amazon Linux AMI : libtirpc (ALAS-2017-840)
  • NASL family Huawei Local Security Checks
    NASL id EULEROS_SA-2017-1097.NASL
    description According to the version of the libtirpc package installed, the EulerOS installation on the remote host is affected by the following vulnerability : - It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. (CVE-2017-8779) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-09-01
    modified 2018-08-10
    plugin id 100690
    published 2017-06-09
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100690
    title EulerOS 2.0 SP2 : libtirpc (EulerOS-SA-2017-1097)
  • NASL family Huawei Local Security Checks
    NASL id EULEROS_SA-2017-1096.NASL
    description According to the version of the libtirpc package installed, the EulerOS installation on the remote host is affected by the following vulnerability : - It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. (CVE-2017-8779) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-09-01
    modified 2018-08-10
    plugin id 100689
    published 2017-06-09
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100689
    title EulerOS 2.0 SP1 : libtirpc (EulerOS-SA-2017-1096)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2017-1314-1.NASL
    description This update for libtirpc fixes the following issues : - CVE-2017-8779: crafted UDP packaged could lead rpcbind to denial-of-service (bsc#1037559) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-09-01
    modified 2018-07-31
    plugin id 100244
    published 2017-05-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100244
    title SUSE SLED12 / SLES12 Security Update : libtirpc (SUSE-SU-2017:1314-1)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2017-1263.NASL
    description From Red Hat Security Advisory 2017:1263 : An update for libtirpc is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The libtirpc packages contain SunLib's implementation of transport-independent remote procedure call (TI-RPC) documentation, which includes a library required by programs in the nfs-utils and rpcbind packages. Security Fix(es) : * It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. (CVE-2017-8779)
    last seen 2018-09-02
    modified 2018-07-24
    plugin id 100342
    published 2017-05-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100342
    title Oracle Linux 7 : libtirpc (ELSA-2017-1263)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2017-57E8F5EC61.NASL
    description Fix for CVE-2017-8779 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-09-01
    modified 2018-02-01
    plugin id 101635
    published 2017-07-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=101635
    title Fedora 26 : libtirpc (2017-57e8f5ec61)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20170523_RPCBIND_ON_SL6_X.NASL
    description Security Fix(es) : - It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. (CVE-2017-8779)
    last seen 2018-09-01
    modified 2018-01-26
    plugin id 100373
    published 2017-05-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100373
    title Scientific Linux Security Update : rpcbind on SL6.x i386/x86_64
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DLA-936.NASL
    description Guido Vranken discovered that incorrect memory management in libtirpc, a transport-independent RPC library used by rpcbind and other programs may result in denial of service via memory exhaustion (depending on memory management settings). For Debian 7 'Wheezy', these problems have been fixed in version 0.2.2-5+deb7u1. We recommend that you upgrade your libtirpc packages. NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-09-01
    modified 2018-07-09
    plugin id 100108
    published 2017-05-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100108
    title Debian DLA-936-1 : libtirpc security update
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20170523_LIBTIRPC_ON_SL6_X.NASL
    description Security Fix(es) : - It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. (CVE-2017-8779)
    last seen 2018-09-01
    modified 2018-01-26
    plugin id 100372
    published 2017-05-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100372
    title Scientific Linux Security Update : libtirpc on SL6.x i386/x86_64
  • NASL family Slackware Local Security Checks
    NASL id SLACKWARE_SSA_2017-191-01.NASL
    description New libtirpc packages are available for Slackware 14.2 and -current to fix a security issue.
    last seen 2018-09-01
    modified 2018-01-26
    plugin id 101358
    published 2017-07-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=101358
    title Slackware 14.2 / current : libtirpc (SSA:2017-191-01)
  • NASL family Virtuozzo Local Security Checks
    NASL id VIRTUOZZO_VZLSA-2017-1268.NASL
    description An update for libtirpc is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The libtirpc packages contain SunLib's implementation of transport-independent remote procedure call (TI-RPC) documentation, which includes a library required by programs in the nfs-utils and rpcbind packages. Security Fix(es) : * It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. (CVE-2017-8779) Note that Tenable Network Security has attempted to extract the preceding description block directly from the corresponding Red Hat security advisory. Virtuozzo provides no description for VZLSA advisories. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-09-02
    modified 2018-07-17
    plugin id 101471
    published 2017-07-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=101471
    title Virtuozzo 6 : libtirpc / libtirpc-devel (VZLSA-2017-1268)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201706-07.NASL
    description The remote host is affected by the vulnerability described in GLSA-201706-07 (Libtirpc and RPCBind: Denial of Service) It was found that due to the way RPCBind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. Impact : A remote attacker could send thousands of messages to RPCBind, possibly resulting in a Denial of Service condition. Workaround : There is no known workaround at this time.
    last seen 2018-09-02
    modified 2018-01-26
    plugin id 100650
    published 2017-06-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100650
    title GLSA-201706-07 : Libtirpc and RPCBind: Denial of Service
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2017-44D0E642A4.NASL
    description Fix for CVE-2017-8779 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-09-01
    modified 2018-02-01
    plugin id 100309
    published 2017-05-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100309
    title Fedora 25 : libtirpc (2017-44d0e642a4)
  • NASL family Virtuozzo Local Security Checks
    NASL id VIRTUOZZO_VZLSA-2017-1263.NASL
    description An update for libtirpc is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The libtirpc packages contain SunLib's implementation of transport-independent remote procedure call (TI-RPC) documentation, which includes a library required by programs in the nfs-utils and rpcbind packages. Security Fix(es) : * It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. (CVE-2017-8779) Note that Tenable Network Security has attempted to extract the preceding description block directly from the corresponding Red Hat security advisory. Virtuozzo provides no description for VZLSA advisories. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-09-01
    modified 2018-07-17
    plugin id 101467
    published 2017-07-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=101467
    title Virtuozzo 7 : libtirpc / libtirpc-devel (VZLSA-2017-1263)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2017-36CBA32910.NASL
    description Security fix for CVE-2017-8779 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-09-01
    modified 2018-02-01
    plugin id 101609
    published 2017-07-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=101609
    title Fedora 26 : rpcbind (2017-36cba32910)
  • NASL family Virtuozzo Local Security Checks
    NASL id VIRTUOZZO_VZLSA-2017-1262.NASL
    description An update for rpcbind is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. [Updated 16 June 2017] The packages distributed with this errata have a bug that can cause the rpcbind utility to terminate unexpectedly at start. RHBA-2017:1436 was released on 13 June 2017 to address this issue. The rpcbind utility is a server that converts Remote Procedure Call (RPC) program numbers into universal addresses. It must be running on the host to be able to make RPC calls on a server on that machine. Security Fix(es) : * It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. (CVE-2017-8779) Note that Tenable Network Security has attempted to extract the preceding description block directly from the corresponding Red Hat security advisory. Virtuozzo provides no description for VZLSA advisories. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-09-02
    modified 2018-08-29
    plugin id 101466
    published 2017-07-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=101466
    title Virtuozzo 7 : rpcbind (VZLSA-2017-1262)
  • NASL family OracleVM Local Security Checks
    NASL id ORACLEVM_OVMSA-2017-0108.NASL
    description The remote OracleVM system is missing necessary patches to address critical security updates : - Fix for CVE-2017-8779 (bz 1449458) - tirpc: fix taddr2uaddr for AF_LOCAL (bz 1285144) - clnt_vc_create: Do not hold a global mutex during connect (bz 1332520) - Backported upstream debugging (bz 1273158) - Fixed memory leak in svc_vc_create (bz 1276687) - Fixed memory leak in svc_tli_create (bz 1276855) - Fixed memory leak in __svc_vc_dodestroy (bz 1276856) - xdr_rejected_reply: Don't crash with invalid server rejection (bz 982064) - Fixed overrun in svcauth_gss_validate (bz 1056809) - Added authgss_free_private_data call (bz 1082807) - Fixed some races in getnetconfig code (bz 1031498) - Remove the installation of libtirpc.a and libtirpc.la (bz 869397)
    last seen 2018-09-01
    modified 2018-07-24
    plugin id 100399
    published 2017-05-25
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100399
    title OracleVM 3.3 / 3.4 : libtirpc (OVMSA-2017-0108)
  • NASL family OracleVM Local Security Checks
    NASL id ORACLEVM_OVMSA-2017-0107.NASL
    description The remote OracleVM system is missing necessary patches to address critical security updates : - Fix for CVE-2017-8779 (bz 1449461) - Soft static allocate rpc uid/gid (bz 1300533) - Fix memory corruption in PMAP_CALLIT code (bz 1186933)
    last seen 2018-09-01
    modified 2018-07-24
    plugin id 100398
    published 2017-05-25
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100398
    title OracleVM 3.3 / 3.4 : rpcbind (OVMSA-2017-0107)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2017-1306-1.NASL
    description This update for libtirpc fixes the following issues : - CVE-2017-8779: crafted UDP packaged could lead rpcbind to denial-of-service (bsc#1037559) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-09-01
    modified 2018-07-31
    plugin id 100241
    published 2017-05-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100241
    title SUSE SLED12 / SLES12 Security Update : libtirpc (SUSE-SU-2017:1306-1)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2017-AC407781C3.NASL
    description Security fix for CVE-2017-8779 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-09-01
    modified 2018-02-02
    plugin id 100196
    published 2017-05-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100196
    title Fedora 25 : rpcbind (2017-ac407781c3)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DLA-937.NASL
    description Guido Vranken discovered that incorrect memory management in libtirpc, a transport-independent RPC library used by rpcbind and other programs may result in denial of service via memory exhaustion (depending on memory management settings). For Debian 7 'Wheezy', these problems have been fixed in version 0.2.0-8+deb7u2. We recommend that you upgrade your rpcbind packages. NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-09-01
    modified 2018-07-09
    plugin id 100109
    published 2017-05-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100109
    title Debian DLA-937-1 : rpcbind security update
  • NASL family Virtuozzo Local Security Checks
    NASL id VIRTUOZZO_VZLSA-2017-1267.NASL
    description An update for rpcbind is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. [Updated 16 June 2017] The packages distributed with this errata have a bug that can cause the rpcbind utility to terminate unexpectedly at start. RHBA-2017:1435 was released on 13 June 2017 to address this issue. The rpcbind utility is a server that converts Remote Procedure Call (RPC) program numbers into universal addresses. It must be running on the host to be able to make RPC calls on a server on that machine. Security Fix(es) : * It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. (CVE-2017-8779) Note that Tenable Network Security has attempted to extract the preceding description block directly from the corresponding Red Hat security advisory. Virtuozzo provides no description for VZLSA advisories. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-09-02
    modified 2018-08-29
    plugin id 101470
    published 2017-07-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=101470
    title Virtuozzo 6 : rpcbind (VZLSA-2017-1267)
  • NASL family Slackware Local Security Checks
    NASL id SLACKWARE_SSA_2017-191-02.NASL
    description New rpcbind packages are available for Slackware 14.2 and -current to fix a security issue.
    last seen 2018-09-01
    modified 2018-01-26
    plugin id 101359
    published 2017-07-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=101359
    title Slackware 14.2 / current : rpcbind (SSA:2017-191-02)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2017-608.NASL
    description This update for libtirpc fixes the following issues : - CVE-2017-8779: crafted UDP packaged could lead rpcbind to denial-of-service (bsc#1037559) This update was imported from the SUSE:SLE-12-SP2:Update update project.
    last seen 2018-09-01
    modified 2018-01-26
    plugin id 100366
    published 2017-05-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100366
    title openSUSE Security Update : libtirpc (openSUSE-2017-608)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2017-1267.NASL
    description An update for rpcbind is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. [Updated 16 June 2017] The packages distributed with this errata have a bug that can cause the rpcbind utility to terminate unexpectedly at start. RHBA-2017:1435 was released on 13 June 2017 to address this issue. The rpcbind utility is a server that converts Remote Procedure Call (RPC) program numbers into universal addresses. It must be running on the host to be able to make RPC calls on a server on that machine. Security Fix(es) : * It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. (CVE-2017-8779)
    last seen 2018-09-07
    modified 2018-09-06
    plugin id 100370
    published 2017-05-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100370
    title RHEL 6 : rpcbind (RHSA-2017:1267)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2017-1395.NASL
    description An update for libntirpc is now available for Red Hat Gluster Storage 3.2 for RHEL 6 and Red Hat Gluster Storage 3.2 for RHEL 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. This package contains a new implementation of the original libtirpc, transport-independent RPC (TI-RPC) library for NFS-Ganesha. Security Fix(es) : * It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. (CVE-2017-8779)
    last seen 2018-09-07
    modified 2018-09-06
    plugin id 100716
    published 2017-06-09
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100716
    title RHEL 6 / 7 : Storage Server (RHSA-2017:1395)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-3759-1.NASL
    description Aldy Hernandez discovered that libtirpc incorrectly handled certain inputs. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2016-4429) It was discovered that libtirpc incorrectly handled certain inputs. An attacker could possibly use this issue to cause a denial of service. (CVE-2018-14622) It was discovered that libtirpc incorrectly handled certain strings. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2017-8779). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-09-07
    modified 2018-09-06
    plugin id 117331
    published 2018-09-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=117331
    title Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS : libtirpc vulnerabilities (USN-3759-1)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20170521_LIBTIRPC_ON_SL7_X.NASL
    description Security Fix(es) : - It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. (CVE-2017-8779)
    last seen 2018-09-01
    modified 2018-01-26
    plugin id 100347
    published 2017-05-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100347
    title Scientific Linux Security Update : libtirpc on SL7.x x86_64
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20170521_RPCBIND_ON_SL7_X.NASL
    description Security Fix(es) : - It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. (CVE-2017-8779)
    last seen 2018-09-01
    modified 2018-01-26
    plugin id 100348
    published 2017-05-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100348
    title Scientific Linux Security Update : rpcbind on SL7.x x86_64
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2017-1263.NASL
    description An update for libtirpc is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The libtirpc packages contain SunLib's implementation of transport-independent remote procedure call (TI-RPC) documentation, which includes a library required by programs in the nfs-utils and rpcbind packages. Security Fix(es) : * It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. (CVE-2017-8779)
    last seen 2018-10-18
    modified 2018-10-17
    plugin id 100318
    published 2017-05-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100318
    title RHEL 7 : libtirpc (RHSA-2017:1263)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2017-1263.NASL
    description An update for libtirpc is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The libtirpc packages contain SunLib's implementation of transport-independent remote procedure call (TI-RPC) documentation, which includes a library required by programs in the nfs-utils and rpcbind packages. Security Fix(es) : * It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. (CVE-2017-8779)
    last seen 2018-11-11
    modified 2018-11-10
    plugin id 100327
    published 2017-05-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100327
    title CentOS 7 : libtirpc (CESA-2017:1263)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2017-1268.NASL
    description From Red Hat Security Advisory 2017:1268 : An update for libtirpc is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The libtirpc packages contain SunLib's implementation of transport-independent remote procedure call (TI-RPC) documentation, which includes a library required by programs in the nfs-utils and rpcbind packages. Security Fix(es) : * It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. (CVE-2017-8779)
    last seen 2018-09-01
    modified 2018-07-24
    plugin id 100369
    published 2017-05-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100369
    title Oracle Linux 6 : libtirpc (ELSA-2017-1268)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2017-1468-1.NASL
    description This update for libtirpc and rpcbind fixes the following issues : - CVE-2017-8779: A crafted UDP package could lead rpcbind to remote denial-of-service. (bsc#1037559) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-09-01
    modified 2018-07-31
    plugin id 100569
    published 2017-06-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100569
    title SUSE SLES11 Security Update : libtirpc, rpcbind (SUSE-SU-2017:1468-1)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2017-1262.NASL
    description An update for rpcbind is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. [Updated 16 June 2017] The packages distributed with this errata have a bug that can cause the rpcbind utility to terminate unexpectedly at start. RHBA-2017:1436 was released on 13 June 2017 to address this issue. The rpcbind utility is a server that converts Remote Procedure Call (RPC) program numbers into universal addresses. It must be running on the host to be able to make RPC calls on a server on that machine. Security Fix(es) : * It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. (CVE-2017-8779)
    last seen 2018-10-18
    modified 2018-10-17
    plugin id 100317
    published 2017-05-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100317
    title RHEL 7 : rpcbind (RHSA-2017:1262)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2017-1262.NASL
    description From Red Hat Security Advisory 2017:1262 : An update for rpcbind is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. [Updated 16 June 2017] The packages distributed with this errata have a bug that can cause the rpcbind utility to terminate unexpectedly at start. RHBA-2017:1436 was released on 13 June 2017 to address this issue. The rpcbind utility is a server that converts Remote Procedure Call (RPC) program numbers into universal addresses. It must be running on the host to be able to make RPC calls on a server on that machine. Security Fix(es) : * It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. (CVE-2017-8779)
    last seen 2018-09-06
    modified 2018-09-05
    plugin id 100341
    published 2017-05-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100341
    title Oracle Linux 7 : rpcbind (ELSA-2017-1262)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2017-1262.NASL
    description An update for rpcbind is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. [Updated 16 June 2017] The packages distributed with this errata have a bug that can cause the rpcbind utility to terminate unexpectedly at start. RHBA-2017:1436 was released on 13 June 2017 to address this issue. The rpcbind utility is a server that converts Remote Procedure Call (RPC) program numbers into universal addresses. It must be running on the host to be able to make RPC calls on a server on that machine. Security Fix(es) : * It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. (CVE-2017-8779)
    last seen 2018-11-11
    modified 2018-11-10
    plugin id 100326
    published 2017-05-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100326
    title CentOS 7 : rpcbind (CESA-2017:1262)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2017-1267.NASL
    description An update for rpcbind is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. [Updated 16 June 2017] The packages distributed with this errata have a bug that can cause the rpcbind utility to terminate unexpectedly at start. RHBA-2017:1435 was released on 13 June 2017 to address this issue. The rpcbind utility is a server that converts Remote Procedure Call (RPC) program numbers into universal addresses. It must be running on the host to be able to make RPC calls on a server on that machine. Security Fix(es) : * It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. (CVE-2017-8779)
    last seen 2018-11-11
    modified 2018-11-10
    plugin id 100358
    published 2017-05-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100358
    title CentOS 6 : rpcbind (CESA-2017:1267)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2017-1268.NASL
    description An update for libtirpc is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The libtirpc packages contain SunLib's implementation of transport-independent remote procedure call (TI-RPC) documentation, which includes a library required by programs in the nfs-utils and rpcbind packages. Security Fix(es) : * It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. (CVE-2017-8779)
    last seen 2018-11-11
    modified 2018-11-10
    plugin id 100359
    published 2017-05-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100359
    title CentOS 6 : libtirpc (CESA-2017:1268)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2017-1336-1.NASL
    description This update for rpcbind fixes the following issues : - CVE-2017-8779: A crafted UDP package could lead rcpbind to remote denial-of-service (bsc#1037559) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-09-02
    modified 2018-07-31
    plugin id 100291
    published 2017-05-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100291
    title SUSE SLED12 / SLES12 Security Update : rpcbind (SUSE-SU-2017:1336-1)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2017-1268.NASL
    description An update for libtirpc is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The libtirpc packages contain SunLib's implementation of transport-independent remote procedure call (TI-RPC) documentation, which includes a library required by programs in the nfs-utils and rpcbind packages. Security Fix(es) : * It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. (CVE-2017-8779)
    last seen 2018-09-07
    modified 2018-09-06
    plugin id 100371
    published 2017-05-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100371
    title RHEL 6 : libtirpc (RHSA-2017:1268)
packetstorm via4
data source https://packetstormsecurity.com/files/download/142408/rpcbindlibtirpc-dos.txt
id PACKETSTORM:142408
last seen 2017-05-09
published 2017-05-08
reporter Guido Vranken
source https://packetstormsecurity.com/files/142408/RPCBind-libtirpc-Denial-Of-Service.html
title RPCBind / libtirpc Denial Of Service
redhat via4
advisories
  • bugzilla
    id 1448124
    title CVE-2017-8779 rpcbind, libtirpc, libntirpc: Memory leak when failing to parse XDR strings or bytearrays
    oval
    AND
    • comment rpcbind is earlier than 0:0.2.0-38.el7_3
      oval oval:com.redhat.rhsa:tst:20171262005
    • comment rpcbind is signed with Red Hat redhatrelease2 key
      oval oval:com.redhat.rhsa:tst:20160005006
    • OR
      • comment Red Hat Enterprise Linux 7 Client is installed
        oval oval:com.redhat.rhsa:tst:20140675001
      • comment Red Hat Enterprise Linux 7 Server is installed
        oval oval:com.redhat.rhsa:tst:20140675002
      • comment Red Hat Enterprise Linux 7 Workstation is installed
        oval oval:com.redhat.rhsa:tst:20140675003
      • comment Red Hat Enterprise Linux 7 ComputeNode is installed
        oval oval:com.redhat.rhsa:tst:20140675004
    rhsa
    id RHSA-2017:1262
    released 2017-05-22
    severity Important
    title RHSA-2017:1262: rpcbind security update (Important)
  • bugzilla
    id 1448124
    title CVE-2017-8779 rpcbind, libtirpc, libntirpc: Memory leak when failing to parse XDR strings or bytearrays
    oval
    AND
    • OR
      • comment Red Hat Enterprise Linux 7 Client is installed
        oval oval:com.redhat.rhsa:tst:20140675001
      • comment Red Hat Enterprise Linux 7 Server is installed
        oval oval:com.redhat.rhsa:tst:20140675002
      • comment Red Hat Enterprise Linux 7 Workstation is installed
        oval oval:com.redhat.rhsa:tst:20140675003
      • comment Red Hat Enterprise Linux 7 ComputeNode is installed
        oval oval:com.redhat.rhsa:tst:20140675004
    • OR
      • AND
        • comment libtirpc is earlier than 0:0.2.4-0.8.el7_3
          oval oval:com.redhat.rhsa:tst:20171263007
        • comment libtirpc is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20130884006
      • AND
        • comment libtirpc-devel is earlier than 0:0.2.4-0.8.el7_3
          oval oval:com.redhat.rhsa:tst:20171263005
        • comment libtirpc-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20130884008
    rhsa
    id RHSA-2017:1263
    released 2017-05-22
    severity Important
    title RHSA-2017:1263: libtirpc security update (Important)
  • bugzilla
    id 1448124
    title CVE-2017-8779 rpcbind, libtirpc, libntirpc: Memory leak when failing to parse XDR strings or bytearrays
    oval
    AND
    • comment rpcbind is earlier than 0:0.2.0-13.el6_9
      oval oval:com.redhat.rhsa:tst:20171267005
    • comment rpcbind is signed with Red Hat redhatrelease2 key
      oval oval:com.redhat.rhsa:tst:20160005006
    • OR
      • comment Red Hat Enterprise Linux 6 Client is installed
        oval oval:com.redhat.rhsa:tst:20100842001
      • comment Red Hat Enterprise Linux 6 Server is installed
        oval oval:com.redhat.rhsa:tst:20100842002
      • comment Red Hat Enterprise Linux 6 Workstation is installed
        oval oval:com.redhat.rhsa:tst:20100842003
      • comment Red Hat Enterprise Linux 6 ComputeNode is installed
        oval oval:com.redhat.rhsa:tst:20100842004
    rhsa
    id RHSA-2017:1267
    released 2017-05-23
    severity Important
    title RHSA-2017:1267: rpcbind security update (Important)
  • bugzilla
    id 1448124
    title CVE-2017-8779 rpcbind, libtirpc, libntirpc: Memory leak when failing to parse XDR strings or bytearrays
    oval
    AND
    • OR
      • comment Red Hat Enterprise Linux 6 Client is installed
        oval oval:com.redhat.rhsa:tst:20100842001
      • comment Red Hat Enterprise Linux 6 Server is installed
        oval oval:com.redhat.rhsa:tst:20100842002
      • comment Red Hat Enterprise Linux 6 Workstation is installed
        oval oval:com.redhat.rhsa:tst:20100842003
      • comment Red Hat Enterprise Linux 6 ComputeNode is installed
        oval oval:com.redhat.rhsa:tst:20100842004
    • OR
      • AND
        • comment libtirpc is earlier than 0:0.2.1-13.el6_9
          oval oval:com.redhat.rhsa:tst:20171268007
        • comment libtirpc is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20130884006
      • AND
        • comment libtirpc-devel is earlier than 0:0.2.1-13.el6_9
          oval oval:com.redhat.rhsa:tst:20171268005
        • comment libtirpc-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20130884008
    rhsa
    id RHSA-2017:1268
    released 2017-05-23
    severity Important
    title RHSA-2017:1268: libtirpc security update (Important)
  • rhsa
    id RHBA-2017:1497
  • rhsa
    id RHSA-2017:1395
rpms
  • rpcbind-0:0.2.0-38.el7_3
  • libtirpc-0:0.2.4-0.8.el7_3
  • libtirpc-devel-0:0.2.4-0.8.el7_3
  • rpcbind-0:0.2.0-13.el6_9
  • libtirpc-0:0.2.1-13.el6_9
  • libtirpc-devel-0:0.2.1-13.el6_9
refmap via4
bid 98325
confirm https://security.netapp.com/advisory/ntap-20180109-0001/
debian DSA-3845
gentoo GLSA-201706-07
misc
sectrack 1038532
ubuntu
  • USN-3759-1
  • USN-3759-2
Last major update 10-05-2017 - 21:29
Published 04-05-2017 - 10:29
Last modified 06-09-2018 - 06:29
Back to Top