The remote host is missing an update for the Huawei EulerOS 'libtirpc' package(s) due to a memory leak vulnerability
Reporter | Title | Published | Views | Family All 183 |
---|---|---|---|---|
![]() | OracleVM 3.3 / 3.4 : rpcbind (OVMSA-2017-0107) | 25 May 201700:00 | โ | nessus |
![]() | EulerOS 2.0 SP1 : rpcbind (EulerOS-SA-2017-1102) | 9 Jun 201700:00 | โ | nessus |
![]() | Fedora 26 : libtirpc (2017-57e8f5ec61) | 17 Jul 201700:00 | โ | nessus |
![]() | EulerOS 2.0 SP5 : rpcbind (EulerOS-SA-2020-1614) | 2 Jun 202000:00 | โ | nessus |
![]() | Fedora 26 : rpcbind (2017-36cba32910) | 17 Jul 201700:00 | โ | nessus |
![]() | Ubuntu 18.04 LTS : rpcbind vulnerability (USN-4986-1) | 9 Jun 202100:00 | โ | nessus |
![]() | Debian DSA-3845-1 : libtirpc - security update | 9 May 201700:00 | โ | nessus |
![]() | Slackware 14.2 / current : libtirpc (SSA:2017-191-01) | 11 Jul 201700:00 | โ | nessus |
![]() | openSUSE Security Update : rpcbind (openSUSE-2017-615) | 26 May 201700:00 | โ | nessus |
![]() | GLSA-201706-07 : Libtirpc and RPCBind: Denial of Service | 7 Jun 201700:00 | โ | nessus |
Source | Link |
---|---|
developer | www.developer.huaweicloud.com/intl/en-us/euleros/securitydetail.html |
# SPDX-FileCopyrightText: 2020 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.1.2.2020.2015");
script_cve_id("CVE-2017-8779");
script_tag(name:"creation_date", value:"2020-09-29 13:40:44 +0000 (Tue, 29 Sep 2020)");
script_version("2024-02-05T14:36:56+0000");
script_tag(name:"last_modification", value:"2024-02-05 14:36:56 +0000 (Mon, 05 Feb 2024)");
script_tag(name:"cvss_base", value:"7.8");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:C");
script_tag(name:"severity_vector", value:"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2017-05-17 16:12:17 +0000 (Wed, 17 May 2017)");
script_name("Huawei EulerOS: Security Advisory for libtirpc (EulerOS-SA-2020-2015)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2020 Greenbone AG");
script_family("Huawei EulerOS Local Security Checks");
script_dependencies("gb_huawei_euleros_consolidation.nasl");
script_mandatory_keys("ssh/login/euleros", "ssh/login/rpms", re:"ssh/login/release=EULEROSVIRTARM64\-3\.0\.6\.0");
script_xref(name:"Advisory-ID", value:"EulerOS-SA-2020-2015");
script_xref(name:"URL", value:"https://developer.huaweicloud.com/intl/en-us/euleros/securitydetail.html?secId=EulerOS-SA-2020-2015");
script_tag(name:"summary", value:"The remote host is missing an update for the Huawei EulerOS 'libtirpc' package(s) announced via the EulerOS-SA-2020-2015 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer.(CVE-2017-8779)");
script_tag(name:"affected", value:"'libtirpc' package(s) on Huawei EulerOS Virtualization for ARM 64 3.0.6.0.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "EULEROSVIRTARM64-3.0.6.0") {
if(!isnull(res = isrpmvuln(pkg:"libtirpc", rpm:"libtirpc~1.1.4~0.h1.eulerosv2r8", rls:"EULEROSVIRTARM64-3.0.6.0"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo