Name | CVE-2017-8779 |
Description | rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-936-1, DLA-937-1, DSA-3845-1 |
Debian Bugs | 861834, 861835, 861836 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
libtirpc (PTS) | jessie, jessie (lts) | 0.2.5-1+deb8u3 | fixed |
stretch | 0.2.5-1.2+deb9u1 | fixed | |
buster (security), buster, buster (lts) | 1.1.4-0.4+deb10u1 | fixed | |
bullseye (security), bullseye | 1.3.1-1+deb11u1 | fixed | |
bookworm | 1.3.3+ds-1 | fixed | |
sid, trixie | 1.3.4+ds-1.3 | fixed | |
ntirpc (PTS) | stretch | 1.4.4-1 | fixed |
buster | 1.7.1-1 | fixed | |
bullseye | 3.4-2 | fixed | |
bookworm | 4.3-2 | fixed | |
sid, trixie | 5.8-2 | fixed | |
rpcbind (PTS) | jessie, jessie (lts) | 0.2.1-6+deb8u2 | fixed |
stretch | 0.2.3-0.6 | fixed | |
buster | 1.2.5-0.3+deb10u1 | fixed | |
bullseye | 1.2.5-9 | fixed | |
bookworm | 1.2.6-6 | fixed | |
sid, trixie | 1.2.6-8.1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
libtirpc | source | wheezy | 0.2.2-5+deb7u1 | DLA-936-1 | ||
libtirpc | source | jessie | 0.2.5-1+deb8u1 | DSA-3845-1 | ||
libtirpc | source | (unstable) | 0.2.5-1.2 | 861834 | ||
ntirpc | source | (unstable) | 1.4.4-1 | 861836 | ||
rpcbind | source | wheezy | 0.2.0-8+deb7u2 | DLA-937-1 | ||
rpcbind | source | jessie | 0.2.1-6+deb8u2 | DSA-3845-1 | ||
rpcbind | source | (unstable) | 0.2.3-0.6 | 861835 |
https://www.openwall.com/lists/oss-security/2017/05/04/1
https://github.com/guidovranken/rpcbomb/
For rpcbind, 0.2.3-0.6 upload was based on Guido Vranken 's patch in
https://github.com/guidovranken/rpcbomb/blob/master/rpcbind_patch.txt
Upstream patch: https://git.linux-nfs.org/?p=steved/rpcbind.git;a=commit;h=7ea36eeece56b59f98e469934e4c20b4da043346 (rpcbind-0_2_5-rc1)
Followup for typo: https://git.linux-nfs.org/?p=steved/rpcbind.git;a=commitdiff;h=c49a7ea639eb700823e174fd605bbbe183e229aa (rpcbind-0_2_5-rc2)