CVE-2017-8779

NameCVE-2017-8779
Descriptionrpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-936-1, DLA-937-1, DSA-3845-1
NVD severityhigh (attack range: remote)
Debian Bugs861834, 861835, 861836

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libtirpc (PTS)wheezy0.2.2-5vulnerable
wheezy (security)0.2.2-5+deb7u1fixed
jessie (security), jessie0.2.5-1+deb8u1fixed
buster, sid, stretch0.2.5-1.2fixed
ntirpc (PTS)stretch1.4.4-1fixed
buster, sid1.5.3-1fixed
rpcbind (PTS)wheezy0.2.0-8+deb7u1vulnerable
wheezy (security)0.2.0-8+deb7u2fixed
jessie (security), jessie0.2.1-6+deb8u2fixed
buster, sid, stretch0.2.3-0.6fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libtirpcsource(unstable)0.2.5-1.2high861834
libtirpcsourcejessie0.2.5-1+deb8u1highDSA-3845-1
libtirpcsourcewheezy0.2.2-5+deb7u1highDLA-936-1
ntirpcsource(unstable)1.4.4-1high861836
rpcbindsource(unstable)0.2.3-0.6high861835
rpcbindsourcejessie0.2.1-6+deb8u2highDSA-3845-1
rpcbindsourcewheezy0.2.0-8+deb7u2highDLA-937-1

Notes

http://www.openwall.com/lists/oss-security/2017/05/04/1
https://github.com/guidovranken/rpcbomb/

Search for package or bug name: Reporting problems