CVE-2017-8779

Published: 04 May 2017

rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb.

Priority

Low

CVSS 3 base score: 7.5

Status

Package Release Status
libtirpc
Launchpad, Ubuntu, Debian
Upstream
Released (0.2.5-1.2)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(0.2.5-1.2)
Ubuntu 20.10 (Groovy Gorilla) Not vulnerable
(0.2.5-1.2)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(0.2.5-1.2)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(0.2.5-1.2)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (0.2.5-1ubuntu0.1)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (0.2.2-5ubuntu2.1)
ntirpc
Launchpad, Ubuntu, Debian
Upstream
Released (1.4.4-1)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(1.6.1-1)
Ubuntu 20.10 (Groovy Gorilla) Not vulnerable
(1.6.1-1)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(1.6.1-1)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(1.6.1-1)
Ubuntu 16.04 ESM (Xenial Xerus) Ignored
(end of standard support, was needed)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

rpcbind
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(1.2.5-9)
Ubuntu 20.10 (Groovy Gorilla) Not vulnerable
(1.2.5-9)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(1.2.5-8)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (0.2.3-0.6ubuntu0.18.04.2)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (0.2.3-0.2ubuntu0.16.04.1+esm1)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (0.2.1-2ubuntu2.2+esm1)
Patches:
Upstream: https://git.linux-nfs.org/?p=steved/rpcbind.git;a=commit;h=7ea36eeece56b59f98e469934e4c20b4da043346