First published: Tue Jul 01 1997(Updated: )
Denial of service in RPC portmapper allows attackers to register or unregister RPC services or spoof RPC services using a spoofed source IP address such as 127.0.0.1.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SGI IRIX | ||
Linux Kernel | =2.6.20.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-0195 is classified as a denial of service vulnerability which poses a significant risk to systems using vulnerable RPC portmapper services.
To mitigate CVE-1999-0195, upgrade to a patched version of the operating system or disable the RPC portmapper service if it is not needed.
CVE-1999-0195 affects SGI IRIX and Linux Kernel version 2.6.20.1 among potentially other systems running RPC services.
Yes, CVE-1999-0195 can be exploited remotely using a spoofed source IP address, making it a concern for network security.
System administrators need to ensure that their systems are not using vulnerable versions of RPC services to avoid service disruptions caused by CVE-1999-0195.