15 lines
No EOL
1.1 KiB
Text
15 lines
No EOL
1.1 KiB
Text
source: https://www.securityfocus.com/bid/1893/info
|
|
|
|
A remote root vulnerability exists in certain versions of rpcbind portmapper.
|
|
|
|
RPC (Remote Procedure Call) allows a program to request a service from a program located in another computer in a network without requiring detailed information on the network configuration.
|
|
|
|
An attacker capable of forging a pmap_set/pmap_unset udp packet can cause the remote host to register or unregister arbitrary RPC programs.
|
|
|
|
This can permit an attacker to carry out a denial of services by disabling key services on the target host, including mountd, nfsd and ypserv.
|
|
|
|
Because it allows a malicious local user to register rpc programs on the server, depending on the program the attacker chooses to register, this vulnerability can allow a compromise of root privilege, potentially extending to other systems on the local network.
|
|
|
|
Note that, in addition to the platforms listed as vulnerable, others have not been test and may also be affected.
|
|
|
|
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20376.tgz |