CVE-2018-14622
Published: 30 August 2018
A null-pointer dereference vulnerability was found in libtirpc before version 0.3.3-rc3. The return value of makefd_xprt() was not checked in all instances, which could lead to a crash when the server exhausted the maximum number of available file descriptors. A remote attacker could cause an rpc-based application to crash by flooding it with new connections.
Priority
CVSS 3 base score: 7.5
Status
Package | Release | Status |
---|---|---|
libtirpc Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(0.2.5-1.2ubuntu0.1)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(0.2.5-1ubuntu0.1)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Released
(0.2.2-5ubuntu2.1)
|
|
Patches: Other: http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=1c77f7a869bdea2a34799d774460d1f9983d45f0 |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14622
- https://bugzilla.redhat.com/show_bug.cgi?id=1620293
- https://bugzilla.novell.com/show_bug.cgi?id=968175
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14622
- https://usn.ubuntu.com/usn/usn-3759-1
- https://usn.ubuntu.com/usn/usn-3759-2
- NVD
- Launchpad
- Debian