Wietse Venema Rpcbind Replacement 2.1 – Denial of Service

Wietse Venema Rpcbind Replacement 2.1 – Denial of Service

漏洞ID 1053377 漏洞类型
发布时间 1998-11-13 更新时间 1998-11-13
图片[1]-Wietse Venema Rpcbind Replacement 2.1 – Denial of Service-安全小百科CVE编号 N/A
图片[2]-Wietse Venema Rpcbind Replacement 2.1 – Denial of Service-安全小百科CNNVD-ID N/A
漏洞平台 Unix CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/20376
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/1893/info

A remote root vulnerability exists in certain versions of rpcbind portmapper. 

RPC (Remote Procedure Call) allows a program to request a service from a program located in another computer in a network without requiring detailed information on the network configuration.

An attacker capable of forging a pmap_set/pmap_unset udp packet can cause the remote host to register or unregister arbitrary RPC programs.

This can permit an attacker to carry out a denial of services by disabling key services on the target host, including mountd, nfsd and ypserv.

Because it allows a malicious local user to register rpc programs on the server, depending on the program the attacker chooses to register, this vulnerability can allow a compromise of root privilege, potentially extending to other systems on the local network.

Note that, in addition to the platforms listed as vulnerable, others have not been test and may also be affected.

https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/20376.tgz

相关推荐: Solaris ifconfig ioctls Vulnerability

Solaris ifconfig ioctls Vulnerability 漏洞ID 1105030 漏洞类型 Unknown 发布时间 1997-08-25 更新时间 1997-08-25 CVE编号 N/A CNNVD-ID N/A 漏洞平台 N/A CV…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享