Lucene search

K
hackeroneB039f6018eb9056011859b0H1:791893
HistoryFeb 10, 2020 - 9:22 a.m.

Endless Group: CVE-2017-8779 exploit on open rpcbind port could lead to remote DoS

2020-02-1009:22:35
b039f6018eb9056011859b0
hackerone.com
649

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.53 Medium

EPSS

Percentile

97.1%

Summary:

An open rpcbind port on https://da.theendlessweb.com allows for possible exploitation by an existing Metasploit module. This could lead to large and unfreed memory allocations for XDR strings.

Description:

Port scanning on 149.56.38.19 which is the IP of https://da.theendlessweb.com shows open port 111 which runs โ€˜rpcbindโ€™. By using the auxiliary module auxiliary/dos/rpc/rpcbomb in Metasploit, it is possible to exploit the port and cause large memory allocations for XDR strings. Excessive memory allocations could exhaust the systems memory leading to a Denial of Service.

As can be seen in the following screenshot:
(please note that I did not expect the module to work therefore I continued the test, I am aware that causing a DoS is a serious offense and do not intend to do any damage)

F711567

The exploit was completed successfully. I did not continue any further out of fear of unintended damage to the site.

Steps To Reproduce:

  1. Open the Metasploit framework and type โ€˜use auxiliary/dos/rpc/rpcbombโ€™
  2. set RHOSTS to 149.56.38.19 and RPORT to 111
  3. Type โ€˜exploitโ€™

Supporting Material/References:

Some reference sites:

https://www.rapid7.com/db/modules/auxiliary/dos/rpc/rpcbomb
https://access.redhat.com/solutions/3025811

##Solution/ Mitigation
Close or filter port 111

Impact

An attacker could use this vulnerability to trigger large unfreed memory allocations on the system leading to a remote Denial of Service.

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.53 Medium

EPSS

Percentile

97.1%