![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-46828 – libtirpc: DoS vulnerability with lots of connections
https://notcve.org/view.php?id=CVE-2021-46828
20 Jul 2022 — In libtirpc before 1.3.3rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled. This can, in turn, lead to an svc_run infinite loop without accepting new connections. En libtirpc versiones anteriores a 1.3.3rc1, los atacantes remotos podían agotar los descriptores de archivo de un proceso que usa libtirpc porque las conexiones TCP inactivas son manejadas inapropiadamente. Esto puede, a su vez, conllevar a un bucle infinito svc_run... • http://git.linux-nfs.org/?p=steved/libtirpc.git%3Ba=commit%3Bh=86529758570cef4c73fb9b9c4104fdc510f701ed • CWE-400: Uncontrolled Resource Consumption CWE-755: Improper Handling of Exceptional Conditions CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2018-14622 – Ubuntu Security Notice USN-3759-2
https://notcve.org/view.php?id=CVE-2018-14622
30 Aug 2018 — A null-pointer dereference vulnerability was found in libtirpc before version 0.3.3-rc3. The return value of makefd_xprt() was not checked in all instances, which could lead to a crash when the server exhausted the maximum number of available file descriptors. A remote attacker could cause an rpc-based application to crash by flooding it with new connections. Se ha encontrado una vulnerabilidad de desreferencia de puntero NULL en libtirpc en versiones anteriores a la 0.3.3-rc3. El valor de retorno de makefd... • http://git.linux-nfs.org/?p=steved/libtirpc.git%3Ba=commit%3Bh=1c77f7a869bdea2a34799d774460d1f9983d45f0 • CWE-252: Unchecked Return Value •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2018-14621
https://notcve.org/view.php?id=CVE-2018-14621
30 Aug 2018 — An infinite loop vulnerability was found in libtirpc before version 1.0.2-rc2. With the port to using poll rather than select, exhaustion of file descriptors would cause the server to enter an infinite loop, consuming a large amount of CPU time and denying service to other clients until restarted. Se ha encontrado una vulnerabilidad de bucle infinito en libtirpc en versiones anteriores a la 1.0.2-rc2. Con el puerto para utilizar poll en lugar de select, el agotamiento de los descriptores de archivo podrían ... • http://git.linux-nfs.org/?p=steved/libtirpc.git%3Ba=commit%3Bh=fce98161d9815ea016855d9f00274276452c2c4b • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2017-8779 – RPCBind / libtirpc - Denial of Service
https://notcve.org/view.php?id=CVE-2017-8779
04 May 2017 — rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb. Rpcbind versión 0.2.4, LIBTIRPC versión 1.0.1 y versiones 1.0.2-rc a 1.0.2-rc3, y NTIRPC versión 1.4.3, no consideran el tamaño máximo de datos RPC durante la asignación ... • https://packetstorm.news/files/id/180538 • CWE-400: Uncontrolled Resource Consumption CWE-770: Allocation of Resources Without Limits or Throttling •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2013-1950 – rpcbind - CALLIT procedure UDP Crash (PoC)
https://notcve.org/view.php?id=CVE-2013-1950
31 May 2013 — The svc_dg_getargs function in libtirpc 0.2.3 and earlier allows remote attackers to cause a denial of service (rpcbind crash) via a Sun RPC request with crafted arguments that trigger a free of an invalid pointer. La función svc_dg_getargs en libtirpc v0.2.3 y anteriores permiten provocar una denegación de servicio (caída de rpcbind) a través de una petición RPC con argumentos manipulados que provocan una liberación de un puntero inválido. These packages provide a transport-independent RPC implementation. ... • https://packetstorm.news/files/id/122431 • CWE-399: Resource Management Errors •