Описание
rpcbind 0.2.0 does not properly validate (1) /tmp/portmap.xdr and (2) /tmp/rpcbind.xdr, which can be created by an attacker before the daemon is started.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 0.2.0-7ubuntu1 |
| hardy | DNE | |
| lucid | ignored | end of life |
| maverick | not-affected | 0.2.0-4.1 |
| natty | not-affected | 0.2.0-4.1 |
| oneiric | not-affected | 0.2.0-6ubuntu3.1 |
| precise | not-affected | 0.2.0-7ubuntu1 |
| quantal | not-affected | 0.2.0-7ubuntu1 |
| raring | not-affected | 0.2.0-7ubuntu1 |
| saucy | not-affected | 0.2.0-7ubuntu1 |
Показывать по
7.2 High
CVSS2
7.8 High
CVSS3
Связанные уязвимости
rpcbind 0.2.0 does not properly validate (1) /tmp/portmap.xdr and (2) /tmp/rpcbind.xdr, which can be created by an attacker before the daemon is started.
rpcbind 0.2.0 does not properly validate (1) /tmp/portmap.xdr and (2) /tmp/rpcbind.xdr, which can be created by an attacker before the daemon is started.
rpcbind 0.2.0 does not properly validate (1) /tmp/portmap.xdr and (2) ...
rpcbind 0.2.0 does not properly validate (1) /tmp/portmap.xdr and (2) /tmp/rpcbind.xdr, which can be created by an attacker before the daemon is started.
7.2 High
CVSS2
7.8 High
CVSS3