First published: Thu May 04 2017(Updated: )
Rpcbind does not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb. References: <a href="http://seclists.org/oss-sec/2017/q2/209">http://seclists.org/oss-sec/2017/q2/209</a> <a href="https://guidovranken.wordpress.com/2017/05/03/rpcbomb-remote-rpcbind-denial-of-service-patches/">https://guidovranken.wordpress.com/2017/05/03/rpcbomb-remote-rpcbind-denial-of-service-patches/</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Sun RPCBind |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1448124 is critical due to its potential to cause a denial of service.
To fix REDHAT-BUG-1448124, update to the latest patched version of rpcbind provided by your operating system vendor.
The vulnerability in REDHAT-BUG-1448124 is caused by rpcbind not considering the maximum RPC data size during memory allocation.
Remote attackers can exploit the vulnerability in REDHAT-BUG-1448124 by sending crafted UDP packets to port 111.
Not addressing REDHAT-BUG-1448124 can lead to system memory exhaustion and potential denial of service.