Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2017-8779Allocation of Resources Without Limits or Throttling in Project Libtirpc

Severity
7.5HIGHNVD
EPSS
81.4%
top 0.83%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedMay 4
Latest updateMay 13

Description

rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages5 packages

Patches

🔴Vulnerability Details

3
GHSA
GHSA-fr7x-wc8q-h255: rpcbind through 02022-05-13
CVEList
CVE-2017-8779: rpcbind through 02017-05-04
OSV
CVE-2017-8779: rpcbind through 02017-05-04

💥Exploits & PoCs

1
Exploit-DB
RPCBind / libtirpc - Denial of Service2017-05-08

📋Vendor Advisories

7
Ubuntu
rpcbind vulnerability2021-06-09
Ubuntu
rpcbind vulnerability2021-06-09
Ubuntu
libtirpc vulnerabilities2018-09-05
Ubuntu
libtirpc vulnerabilities2018-09-05
Red Hat
glibc: memory leak in sunrpc when decoding malformed XDR2017-05-08

💬Community

8
HackerOne
CVE-2017-8779 exploit on open rpcbind port could lead to remote DoS2020-02-12
HackerOne
rpcbind "rpcbomb" CVE-2017-8779, CVE-2017-88042019-10-14
Bugzilla
CVE-2017-8804 glibc: memory leak in sunrpc when decoding malformed XDR2017-05-08
Bugzilla
CVE-2017-8779 libntirpc: rpcbind: Unbounded maximum RPC data size during memory allocation for XDR strings [fedora-all]2017-05-04
Bugzilla
CVE-2017-8779 libntirpc: rpcbind: Unbounded maximum RPC data size during memory allocation for XDR strings [epel-all]2017-05-04
CVE-2017-8779 — Libtirpc Project Libtirpc vulnerability | cvebase