|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for rpcbind RHSA-2017:1267-01|
|Summary:||The remote host is missing an update for the 'rpcbind'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'rpcbind'
package(s) announced via the referenced advisory.
The rpcbind utility is a server that
converts Remote Procedure Call (RPC) program numbers into universal addresses.
It must be running on the host to be able to make RPC calls on a server on
* It was found that due to the way rpcbind uses libtirpc (libntirpc), a
memory leak can occur when parsing specially crafted XDR messages. An
attacker sending thousands of messages to rpcbind could cause its memory
usage to grow without bound, eventually causing it to be terminated by the
OOM killer. (CVE-2017-8779)
Red Hat Enterprise Linux Desktop (v. 6),
Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2017-8779|
BugTraq ID: 98325
Debian Security Information: DSA-3845 (Google Search)
RedHat Security Advisories: RHBA-2017:1497
RedHat Security Advisories: RHSA-2017:1262
RedHat Security Advisories: RHSA-2017:1263
RedHat Security Advisories: RHSA-2017:1267
RedHat Security Advisories: RHSA-2017:1268
RedHat Security Advisories: RHSA-2017:1395
|Copyright||Copyright (C) 2017 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.