A buffer overflow in RPCBind might allow remote attackers to cause a Denial of Service.
Package | net-nds/rpcbind on all architectures |
---|---|
Affected versions | < 0.2.3-r1 |
Unaffected versions | >= 0.2.3-r1 |
The RPCBind utility is a server that converts RPC program numbers into universal addresses.
A use-after-free vulnerability was discovered in RPCBind’s svc_dodestroy function when trying to free a corrupted xprt->xp_netid pointer.
A remote attacker could possibly cause a Denial of Service condition.
There is no known workaround at this time.
All RPCBind users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-nds/rpcbind-0.2.3-r1"
Release date
November 22, 2016
Latest revision
November 22, 2016: 2
Severity
normal
Exploitable
remote
Bugzilla entries