Количество 17
Количество 17
BDU:2021-05819
Уязвимость сервера динамического назначения RPC-портов RPCbind, связанная с неограниченным распределением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
CVE-2017-8779
rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb.
CVE-2017-8779
rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb.
CVE-2017-8779
rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb.
CVE-2017-8779
rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0 ...
openSUSE-SU-2017:1412-1
Security update for rpcbind
openSUSE-SU-2017:1381-1
Security update for libtirpc
SUSE-SU-2017:1468-1
Security update for libtirpc, rpcbind
SUSE-SU-2017:1336-1
Security update for rpcbind
SUSE-SU-2017:1328-1
Security update for rpcbind
SUSE-SU-2017:1314-1
Security update for libtirpc
SUSE-SU-2017:1306-1
Security update for libtirpc
GHSA-fr7x-wc8q-h255
rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb.
ELSA-2017-1268
ELSA-2017-1268: libtirpc security update (IMPORTANT)
ELSA-2017-1267
ELSA-2017-1267: rpcbind security update (IMPORTANT)
ELSA-2017-1263
ELSA-2017-1263: libtirpc security update (IMPORTANT)
ELSA-2017-1262
ELSA-2017-1262: rpcbind security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2021-05819 Уязвимость сервера динамического назначения RPC-портов RPCbind, связанная с неограниченным распределением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 83% Высокий | больше 8 лет назад | |
CVE-2017-8779 rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb. | CVSS3: 7.5 | 83% Высокий | больше 8 лет назад | |
CVE-2017-8779 rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb. | CVSS3: 7.5 | 83% Высокий | больше 8 лет назад | |
CVE-2017-8779 rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb. | CVSS3: 7.5 | 83% Высокий | больше 8 лет назад | |
CVE-2017-8779 rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0 ... | CVSS3: 7.5 | 83% Высокий | больше 8 лет назад | |
openSUSE-SU-2017:1412-1 Security update for rpcbind | 83% Высокий | больше 8 лет назад | ||
openSUSE-SU-2017:1381-1 Security update for libtirpc | 83% Высокий | больше 8 лет назад | ||
SUSE-SU-2017:1468-1 Security update for libtirpc, rpcbind | 83% Высокий | больше 8 лет назад | ||
SUSE-SU-2017:1336-1 Security update for rpcbind | 83% Высокий | больше 8 лет назад | ||
SUSE-SU-2017:1328-1 Security update for rpcbind | 83% Высокий | больше 8 лет назад | ||
SUSE-SU-2017:1314-1 Security update for libtirpc | 83% Высокий | больше 8 лет назад | ||
SUSE-SU-2017:1306-1 Security update for libtirpc | 83% Высокий | больше 8 лет назад | ||
GHSA-fr7x-wc8q-h255 rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb. | CVSS3: 7.5 | 83% Высокий | больше 3 лет назад | |
ELSA-2017-1268 ELSA-2017-1268: libtirpc security update (IMPORTANT) | больше 8 лет назад | |||
ELSA-2017-1267 ELSA-2017-1267: rpcbind security update (IMPORTANT) | больше 8 лет назад | |||
ELSA-2017-1263 ELSA-2017-1263: libtirpc security update (IMPORTANT) | больше 8 лет назад | |||
ELSA-2017-1262 ELSA-2017-1262: rpcbind security update (IMPORTANT) | больше 8 лет назад |
Уязвимостей на страницу