header-logo
Suggest Exploit
vendor:
rpcbind portmapper
by:
SecurityFocus
7.5
CVSS
HIGH
Remote root vulnerability
264
CWE
Product Name: rpcbind portmapper
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: YES
Related CWE: CVE-2002-0392
CPE: None
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Linux, Solaris, AIX, HP-UX, IRIX, Tru64, OSF/1, SCO, FreeBSD, NetBSD, OpenBSD
2002

Remote root vulnerability in certain versions of rpcbind portmapper

An attacker capable of forging a pmap_set/pmap_unset udp packet can cause the remote host to register or unregister arbitrary RPC programs. This can permit an attacker to carry out a denial of services by disabling key services on the target host, including mountd, nfsd and ypserv. Because it allows a malicious local user to register rpc programs on the server, depending on the program the attacker chooses to register, this vulnerability can allow a compromise of root privilege, potentially extending to other systems on the local network.

Mitigation:

Apply the appropriate vendor-supplied patch.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/1893/info

A remote root vulnerability exists in certain versions of rpcbind portmapper. 

RPC (Remote Procedure Call) allows a program to request a service from a program located in another computer in a network without requiring detailed information on the network configuration.

An attacker capable of forging a pmap_set/pmap_unset udp packet can cause the remote host to register or unregister arbitrary RPC programs.

This can permit an attacker to carry out a denial of services by disabling key services on the target host, including mountd, nfsd and ypserv.

Because it allows a malicious local user to register rpc programs on the server, depending on the program the attacker chooses to register, this vulnerability can allow a compromise of root privilege, potentially extending to other systems on the local network.

Note that, in addition to the platforms listed as vulnerable, others have not been test and may also be affected.

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20376.tgz