Описание
rpcbind 0.2.0 does not properly validate (1) /tmp/portmap.xdr and (2) /tmp/rpcbind.xdr, which can be created by an attacker before the daemon is started.
rpcbind 0.2.0 does not properly validate (1) /tmp/portmap.xdr and (2) /tmp/rpcbind.xdr, which can be created by an attacker before the daemon is started.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2010-2061
- https://access.redhat.com/security/cve/cve-2010-2061
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583435#5
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-2061
- https://security-tracker.debian.org/tracker/CVE-2010-2061
- https://www.openwall.com/lists/oss-security/2010/06/08/3
Связанные уязвимости
rpcbind 0.2.0 does not properly validate (1) /tmp/portmap.xdr and (2) /tmp/rpcbind.xdr, which can be created by an attacker before the daemon is started.
rpcbind 0.2.0 does not properly validate (1) /tmp/portmap.xdr and (2) /tmp/rpcbind.xdr, which can be created by an attacker before the daemon is started.
rpcbind 0.2.0 does not properly validate (1) /tmp/portmap.xdr and (2) /tmp/rpcbind.xdr, which can be created by an attacker before the daemon is started.
rpcbind 0.2.0 does not properly validate (1) /tmp/portmap.xdr and (2) ...