CVE-2001-1124
CVSS5.0
发布时间 :2001-10-01 00:00:00
修订时间 :2009-03-04 00:09:36
NMCOS    

[原文]rpcbind in HP-UX 11.00, 11.04 and 11.11 allows remote attackers to cause a denial of service (core dump) via a malformed RPC portmap requests, possibly related to a buffer overflow.


[CNNVD]RPCBind / Portmap畸形RPC请求拒绝服务漏洞(CNNVD-200110-002)

        HP-UX 11.00,11.04和11.1版本的rpcbind存在漏洞。远程攻击者可以借助畸形RPC portmap请求导致服务拒绝(核心转储),该漏洞可能和缓冲区溢出有关。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:hp:hp-ux:11.04HP HP-UX 11.04
cpe:/o:hp:hp-ux:11.00HP-UX 11.00
cpe:/o:hp:hp-ux:11.11HP-UX 11.11

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:5683HP-UX Running rpcbind Software, Denial of Service (DoS)
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1124
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-1124
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200110-002
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/static/7221.php
(VENDOR_ADVISORY)  XF  hp-rpcbind-dos(7221)
http://www.securityfocus.com/bid/3400
(VENDOR_ADVISORY)  BID  3400
http://www.securityfocus.com/advisories/3586
(VENDOR_ADVISORY)  HP  HPSBUX0110-169
http://www.ciac.org/ciac/bulletins/m-003.shtml
(UNKNOWN)  CIAC  M-003

- 漏洞信息

RPCBind / Portmap畸形RPC请求拒绝服务漏洞
中危 缓冲区溢出
2001-10-01 00:00:00 2009-03-04 00:00:00
远程  
        HP-UX 11.00,11.04和11.1版本的rpcbind存在漏洞。远程攻击者可以借助畸形RPC portmap请求导致服务拒绝(核心转储),该漏洞可能和缓冲区溢出有关。

- 公告与补丁

        Fixes available:
        HP HP-UX 11.0
        
        HP HP-UX 11.0 4
        
        HP HP-UX 11.11
        
        SGI IRIX 6.5.11 f
        
        SGI IRIX 6.5.11 m
        
        SGI IRIX 6.5.12 f
        
        SGI IRIX 6.5.12 m
        
        SGI IRIX 6.5.13 f
        
        SGI IRIX 6.5.13 m
        
        SGI IRIX 6.5.14 f
        
        SGI IRIX 6.5.14 m
        
        SGI IRIX 6.5.15 m
        
        SGI IRIX 6.5.15 f
        

- 漏洞信息

9621
HP-UX rpcbind Malformed RPC Request DoS
Denial of Service
Loss of Availability

- 漏洞描述

Unknown or Incomplete

- 时间线

2001-10-01 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

RPCBind / Portmap Malformed RPC Request Denial of Service Vulnerability
Boundary Condition Error 3400
Yes No
2001-10-01 12:00:00 2009-07-11 07:56:00
This vulnerability was announced in an HP Security Advisory on October 1, 2001.

- 受影响的程序版本

SGI IRIX 6.5.15 m
SGI IRIX 6.5.15 f
SGI IRIX 6.5.14 m
SGI IRIX 6.5.14 f
SGI IRIX 6.5.13 m
SGI IRIX 6.5.13 f
SGI IRIX 6.5.12 m
SGI IRIX 6.5.12 f
SGI IRIX 6.5.11 m
SGI IRIX 6.5.11 f
SGI IRIX 6.5.10
SGI IRIX 6.5.9
SGI IRIX 6.5.8
SGI IRIX 6.5.7
SGI IRIX 6.5.6
SGI IRIX 6.5.5
SGI IRIX 6.5.4
SGI IRIX 6.5.3
SGI IRIX 6.5.2
SGI IRIX 6.5.1
SGI IRIX 6.5
HP HP-UX 11.11
HP HP-UX 11.0 4
HP HP-UX 11.0

- 漏洞讨论

A problem in some rpcbind/portmap implementations could make it possible for remote users to deny service to legitimate users of rpc dependent services. Malformed RPC requests may cause the portmapper to crash. This may be due to a buffer overflow condition.

This makes it possible for a remote user to exploit the service, and potentially deny rpc dependent service access such as NIS to other users of the system.

One of the conditions has been described by HP as 'random buffer overflows' and is present when the system is under heavy load. It is not known if code execution is possible. Additionally, similar conditions have been reported in rpcbind/portmap implementations for SGI IRIX.

- 漏洞利用

Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

Fixes available:


HP HP-UX 11.0

HP HP-UX 11.0 4

HP HP-UX 11.11

SGI IRIX 6.5.11 f

SGI IRIX 6.5.11 m

SGI IRIX 6.5.12 f

SGI IRIX 6.5.12 m

SGI IRIX 6.5.13 f

SGI IRIX 6.5.13 m

SGI IRIX 6.5.14 f

SGI IRIX 6.5.14 m

SGI IRIX 6.5.15 m

SGI IRIX 6.5.15 f

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站