A null-pointer dereference vulnerability was found in libtirpc before version 0.3.3-rc3. The return value of makefd_xprt() was not checked in all instances, which could lead to a crash when the server exhausted the maximum number of available file descriptors. A remote attacker could cause an rpc-based application to crash by flooding it with new connections.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-1487-1 libtirpc security update
EUVD EUVD EUVD-2018-6529 A null-pointer dereference vulnerability was found in libtirpc before version 0.3.3-rc3. The return value of makefd_xprt() was not checked in all instances, which could lead to a crash when the server exhausted the maximum number of available file descriptors. A remote attacker could cause an rpc-based application to crash by flooding it with new connections.
Ubuntu USN Ubuntu USN USN-3759-1 libtirpc vulnerabilities
Ubuntu USN Ubuntu USN USN-3759-2 libtirpc vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-05T09:29:51.941Z

Reserved: 2018-07-27T00:00:00

Link: CVE-2018-14622

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-08-30T13:29:00.627

Modified: 2024-11-21T03:49:26.600

Link: CVE-2018-14622

cve-icon Redhat

Severity : Low

Publid Date: 2016-03-03T00:00:00Z

Links: CVE-2018-14622 - Bugzilla

cve-icon OpenCVE Enrichment

No data.