Описание
Integer overflow in xdr_array function in RPC servers for operating systems that use libc, glibc, or other code based on SunRPC including dietlibc, allows remote attackers to execute arbitrary code by passing a large number of arguments to xdr_array through RPC services such as rpc.cmsd and dmispd.
Ссылки
- Broken Link
 - Broken Link
 - Broken Link
 - Broken Link
 - Broken Link
 - Broken Link
 - Broken Link
 - Broken LinkVendor Advisory
 - Broken Link
 - Broken Link
 - ExploitMailing List
 - ExploitMailing List
 - ExploitMailing List
 - ExploitMailing List
 - Mailing List
 - Broken LinkThird Party AdvisoryVDB Entry
 - Broken LinkThird Party AdvisoryVDB Entry
 - Broken Link
 - Broken Link
 - PatchThird Party AdvisoryUS Government Resource
 
Уязвимые конфигурации
Одно из
Одно из
EPSS
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
Связанные уязвимости
Integer overflow in xdr_array function in RPC servers for operating systems that use libc, glibc, or other code based on SunRPC including dietlibc, allows remote attackers to execute arbitrary code by passing a large number of arguments to xdr_array through RPC services such as rpc.cmsd and dmispd.
Integer overflow in xdr_array function in RPC servers for operating sy ...
Integer overflow in xdr_array function in RPC servers for operating systems that use libc, glibc, or other code based on SunRPC including dietlibc, allows remote attackers to execute arbitrary code by passing a large number of arguments to xdr_array through RPC services such as rpc.cmsd and dmispd.
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS
9.8 Critical
CVSS3
10 Critical
CVSS2