|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for libtirpc RHSA-2017:1263-01|
|Summary:||The remote host is missing an update for the 'libtirpc'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'libtirpc'
package(s) announced via the referenced advisory.
The libtirpc packages contain SunLib's
implementation of transport-independent remote procedure call (TI-RPC) documentation,
which includes a library required by programs in the nfs-utils and rpcbind
* It was found that due to the way rpcbind uses libtirpc (libntirpc), a
memory leak can occur when parsing specially crafted XDR messages. An
attacker sending thousands of messages to rpcbind could cause its memory
usage to grow without bound, eventually causing it to be terminated by the
OOM killer. (CVE-2017-8779)
libtirpc on Red Hat Enterprise Linux Server (v. 7)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2017-8779|
BugTraq ID: 98325
Debian Security Information: DSA-3845 (Google Search)
RedHat Security Advisories: RHBA-2017:1497
RedHat Security Advisories: RHSA-2017:1262
RedHat Security Advisories: RHSA-2017:1263
RedHat Security Advisories: RHSA-2017:1267
RedHat Security Advisories: RHSA-2017:1268
RedHat Security Advisories: RHSA-2017:1395
|Copyright||Copyright (C) 2017 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.