Lucene search

K
zdiAnonymousZDI-11-168
HistoryMay 16, 2011 - 12:00 a.m.

Multiple Vendor librpc.dll Remote Information Disclosure Vulnerability

2011-05-1600:00:00
Anonymous
www.zerodayinitiative.com
7

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:N/A:P

0.026 Low

EPSS

Percentile

90.2%

This vulnerability allows remote attackers to register RPC services on vulnerable installations of EMC Legato Networker and IBM Informix Dynamic Server. Authentication is not required to exploit this vulnerability. The flaw exists within the librpc.dll component which listens by default on UDP port 111. When handling the pmap_set request the process verifies the source address is β€œ127.0.0.1”. This communication is via UDP and a valid source address is not required, a udp packet from source address β€œ127.0.0.1” can be created sent to this service allowing a remote attacker to register and unregister RPC services. A remote attack can use this vulnerability to create a denial of service condition or eavesdrop on process communications.

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:N/A:P

0.026 Low

EPSS

Percentile

90.2%