CVE-2017-8779

Published: 04 May 2017

rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb.

Priority

Low

CVSS 3 base score: 7.5

Status

Package Release Status
libtirpc
Launchpad, Ubuntu, Debian
Upstream
Released (0.2.5-1.2)
Ubuntu 20.10 (Groovy Gorilla) Not vulnerable
(0.2.5-1.2)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(0.2.5-1.2)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(0.2.5-1.2)
Ubuntu 16.04 LTS (Xenial Xerus)
Released (0.2.5-1ubuntu0.1)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (0.2.2-5ubuntu2.1)
ntirpc
Launchpad, Ubuntu, Debian
Upstream
Released (1.4.4-1)
Ubuntu 20.10 (Groovy Gorilla) Not vulnerable
(1.6.1-1)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(1.6.1-1)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(1.6.1-1)
Ubuntu 16.04 LTS (Xenial Xerus) Needed

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

rpcbind
Launchpad, Ubuntu, Debian
Upstream
Released (0.2.3-0.6)
Ubuntu 20.10 (Groovy Gorilla) Not vulnerable
(0.2.3-0.6)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(0.2.3-0.6)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(0.2.3-0.6)
Ubuntu 16.04 LTS (Xenial Xerus) Needed

Ubuntu 14.04 ESM (Trusty Tahr) Needed