First published: Wed Aug 03 2005(Updated: )
RPC portmapper (rpcbind) in SCO UnixWare 7.1.1 m5, 7.1.3 mp5, and 7.1.4 mp2 allows remote attackers or local users to cause a denial of service (lack of response) via multiple invalid portmap requests.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xinuos UnixWare | =7.1.1_m5 | |
Xinuos UnixWare | =7.1.3_mp5 | |
Xinuos UnixWare | =7.1.4_mp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2132 is considered a high severity vulnerability due to its potential to cause a denial of service.
To mitigate CVE-2005-2132, it is recommended to implement firewall rules to restrict access to the RPC portmapper service.
CVE-2005-2132 affects users of SCO UnixWare versions 7.1.1 m5, 7.1.3 mp5, and 7.1.4 mp2.
CVE-2005-2132 enables remote attackers to initiate a denial of service attack through multiple invalid portmap requests.
A possible workaround for CVE-2005-2132 is to disable the RPC portmapper service if it is not needed.