CVE-2017-8779

NameCVE-2017-8779
Descriptionrpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-936-1, DLA-937-1, DSA-3845-1
NVD severityhigh
Debian Bugs861834, 861835, 861836

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libtirpc (PTS)stretch0.2.5-1.2+deb9u1fixed
buster1.1.4-0.4fixed
bullseye1.2.6-1fixed
sid1.2.6-2fixed
ntirpc (PTS)stretch1.4.4-1fixed
buster1.7.1-1fixed
bullseye, sid3.2-2fixed
rpcbind (PTS)stretch0.2.3-0.6fixed
buster1.2.5-0.3+deb10u1fixed
bullseye, sid1.2.5-9fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libtirpcsourcewheezy0.2.2-5+deb7u1DLA-936-1
libtirpcsourcejessie0.2.5-1+deb8u1DSA-3845-1
libtirpcsource(unstable)0.2.5-1.2861834
ntirpcsource(unstable)1.4.4-1861836
rpcbindsourcewheezy0.2.0-8+deb7u2DLA-937-1
rpcbindsourcejessie0.2.1-6+deb8u2DSA-3845-1
rpcbindsource(unstable)0.2.3-0.6861835

Notes

https://www.openwall.com/lists/oss-security/2017/05/04/1
https://github.com/guidovranken/rpcbomb/

Search for package or bug name: Reporting problems