Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2011-4609

Опубликовано: 05 мая 2011
Источник: redhat
CVSS2: 3.3
EPSS Низкий

Описание

The svc_run function in the RPC implementation in glibc before 2.15 allows remote attackers to cause a denial of service (CPU consumption) via a large number of RPC connections.

A denial of service flaw was found in the remote procedure call (RPC) implementation in glibc. A remote attacker able to open a large number of connections to an RPC service that is using the RPC implementation from glibc, could use this flaw to make that service use an excessive amount of CPU time.

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=767299glibc: svc_run() produces high cpu usage when accept() fails with EMFILE error

EPSS

Процентиль: 65%
0.00474
Низкий

3.3 Low

CVSS2

Связанные уязвимости

ubuntu
почти 13 лет назад

The svc_run function in the RPC implementation in glibc before 2.15 allows remote attackers to cause a denial of service (CPU consumption) via a large number of RPC connections.

nvd
почти 13 лет назад

The svc_run function in the RPC implementation in glibc before 2.15 allows remote attackers to cause a denial of service (CPU consumption) via a large number of RPC connections.

debian
почти 13 лет назад

The svc_run function in the RPC implementation in glibc before 2.15 al ...

github
почти 4 года назад

The svc_run function in the RPC implementation in glibc before 2.15 allows remote attackers to cause a denial of service (CPU consumption) via a large number of RPC connections.

oracle-oval
около 14 лет назад

ELSA-2012-0058: glibc security and bug fix update (MODERATE)

EPSS

Процентиль: 65%
0.00474
Низкий

3.3 Low

CVSS2