CVE-2017-8779

HIGH

Rpcbind < 0.2.4 - Resource Allocation Without Limits

Title source: rule

Description

rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb.

Exploits (3)

exploitdb WORKING POC
by Guido Vranken · rubydoslinux
https://www.exploit-db.com/exploits/41974
nomisec WORKING POC 4 stars
by drbothen · poc
https://github.com/drbothen/GO-RPCBOMB
metasploit WORKING POC
by guidovranken · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/dos/rpc/rpcbomb.rb

Scores

CVSS v3 7.5
EPSS 0.8138
EPSS Percentile 99.2%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-770
Status published
Products (3)
libtirpc_project/libtirpc < 1.0.1
ntirpc_project/ntirpc < 1.4.3
rpcbind_project/rpcbind < 0.2.4
Published May 04, 2017
Tracked Since Feb 18, 2026