Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 244819 - net-libs/libtirpc: "__rpc_taddr2uaddr_af()" Denial of Service Vulnerability
Summary: net-libs/libtirpc: "__rpc_taddr2uaddr_af()" Denial of Service Vulnerability
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High trivial (vote)
Assignee: Gentoo Security
URL: http://secunia.com/advisories/32403/
Whiteboard: ~3 [noglsa]
Keywords:
Depends on: 249151
Blocks:
  Show dependency tree
 
Reported: 2008-10-28 20:07 UTC by Matti Bickel (RETIRED)
Modified: 2008-11-30 16:49 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Matti Bickel (RETIRED) gentoo-dev 2008-10-28 20:07:30 UTC
From secunia:

CRITICAL:
Less critical

IMPACT:
DoS

WHERE:
From local network

SOFTWARE:
libtirpc 0.x
http://secunia.com/advisories/product/17898/

DESCRIPTION:
A vulnerability has been reported in libtirpc, which can be exploited
by malicious people to cause a DoS (Denial of Service).

The vulnerability is caused due to an error within the
"__rpc_taddr2uaddr_af()" function in src/rpc_generic.c and can be
exploited to crash an application using the library via a specially
crafted RPC request.

This may be related to:
SA23700

The vulnerability is reported in version 0.1.9. Other versions may
also be affected.

SOLUTION:
Do not process untrusted RPC requests using the library.

PROVIDED AND/OR DISCOVERED BY:
Reported by Tomas Hoger in a Red Hat bug report.

ORIGINAL ADVISORY:
https://bugzilla.redhat.com/show_bug.cgi?id=468014

OTHER REFERENCES:
SA23700:
http://secunia.com/advisories/23700/
Comment 1 Matti Bickel (RETIRED) gentoo-dev 2008-10-28 20:53:50 UTC
Adjusting severity, was my fault letting it stay on normal.


This is the upstream bug: http://sourceforge.net/tracker/index.php?func=detail&aid=2192645&group_id=183075&atid=903784

upstream has released 0.1.9: http://sourceforge.net/project/showfiles.php?group_id=183075&package_id=212488&release_id=612386
which should fix the issue.
Comment 2 Tomas Hoger 2008-10-29 07:54:38 UTC
Matti, 0.1.9 should be affected as well.  Upstream bug report was opened just a couple of days ago, while 0.1.9 was released nearly 4 months ago (according to timestamp on SF download page).

Fedora libtirpc maintainer added fix to 0.1.9 packages as well:
http://koji.fedoraproject.org/koji/buildinfo?buildID=67739
http://cvs.fedoraproject.org/viewvc/rpms/libtirpc/devel/libtirpc-0.1.7-taddr2uaddr-segflt.patch?view=log

HTH
Comment 3 Matti Bickel (RETIRED) gentoo-dev 2008-10-29 18:51:50 UTC
Thanks, Tomas. I was under the impression, that the bug was already fixed upstream, but i mistook redhat fixing it for upstream releasing a new version...

So net-fs ppl: either wait for upstream to fix it, or apply the redhat patch tomas so kindly pointed out.
Comment 4 SpanKY gentoo-dev 2008-11-28 18:34:05 UTC
libtirpc-0.1.10 is in the tree now