The portmapper may act as a proxy and redirect service requests from an attacker, making the request appear to come from the local host, possibly bypassing authentication that would otherwise have taken place. For example, NFS file systems could be mounted through the portmapper despite export restrictions.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 1999-09-29T04:00:00
Updated: 2024-08-01T16:27:57.737Z
Reserved: 1999-06-07T00:00:00
Link: CVE-1999-0168
Vulnrichment
No data.
NVD
Status : Modified
Published: 1992-06-04T04:00:00.000
Modified: 2024-11-20T23:28:02.037
Link: CVE-1999-0168
Redhat
No data.