RPCBind Project RPCBind 0.2.0

CPE Details

RPCBind Project RPCBind 0.2.0
0.2.0
2019-02-27
16h45 +00:00
2019-02-27
16h45 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:rpcbind_project:rpcbind:0.2.0:*:*:*:*:*:*:*

Informations

Vendor

rpcbind_project

Product

rpcbind

Version

0.2.0

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2010-2064 2019-10-29 20h01 +00:00 rpcbind 0.2.0 allows local users to write to arbitrary files or gain privileges via a symlink attack on (1) /tmp/portmap.xdr and (2) /tmp/rpcbind.xdr.
7.1
High
CVE-2010-2061 2019-10-29 20h01 +00:00 rpcbind 0.2.0 does not properly validate (1) /tmp/portmap.xdr and (2) /tmp/rpcbind.xdr, which can be created by an attacker before the daemon is started.
7.8
High
CVE-2017-8779 2017-05-04 12h00 +00:00 rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb.
7.5
High
CVE-2015-7236 2015-10-01 18h00 +00:00 Use-after-free vulnerability in xprt_set_caller in rpcb_svc_com.c in rpcbind 0.2.1 and earlier allows remote attackers to cause a denial of service (daemon crash) via crafted packets, involving a PMAP_CALLIT code.
7.5
High