Exploit Wietse Venema Rpcbind Replacement 2.1 - Denial of Service

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
20376
Проверка EDB
  1. Пройдено
Автор
PATRICK GILBERT
Тип уязвимости
DOS
Платформа
UNIX
CVE
null
Дата публикации
1998-11-13
Код:
source: https://www.securityfocus.com/bid/1893/info

A remote root vulnerability exists in certain versions of rpcbind portmapper. 

RPC (Remote Procedure Call) allows a program to request a service from a program located in another computer in a network without requiring detailed information on the network configuration.

An attacker capable of forging a pmap_set/pmap_unset udp packet can cause the remote host to register or unregister arbitrary RPC programs.

This can permit an attacker to carry out a denial of services by disabling key services on the target host, including mountd, nfsd and ypserv.

Because it allows a malicious local user to register rpc programs on the server, depending on the program the attacker chooses to register, this vulnerability can allow a compromise of root privilege, potentially extending to other systems on the local network.

Note that, in addition to the platforms listed as vulnerable, others have not been test and may also be affected.

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20376.tgz
 
Источник
www.exploit-db.com