CVE-2021-46828
- EPSS 0.37%
- Published 20.07.2022 06:15:07
- Last modified 05.05.2025 17:17:29
In libtirpc before 1.3.3rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled. This can, in turn, lead to an svc_run infinite loop without accepting new connections.
CVE-2018-14621
- EPSS 0.48%
- Published 30.08.2018 13:29:00
- Last modified 21.11.2024 03:49:26
An infinite loop vulnerability was found in libtirpc before version 1.0.2-rc2. With the port to using poll rather than select, exhaustion of file descriptors would cause the server to enter an infinite loop, consuming a large amount of CPU time and d...
CVE-2018-14622
- EPSS 2.34%
- Published 30.08.2018 13:29:00
- Last modified 21.11.2024 03:49:26
A null-pointer dereference vulnerability was found in libtirpc before version 0.3.3-rc3. The return value of makefd_xprt() was not checked in all instances, which could lead to a crash when the server exhausted the maximum number of available file de...
CVE-2017-8779
- EPSS 84.2%
- Published 04.05.2017 14:29:00
- Last modified 20.04.2025 01:37:25
rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (mem...
CVE-2013-1950
- EPSS 5.46%
- Published 09.07.2013 17:55:00
- Last modified 11.04.2025 00:51:21
The svc_dg_getargs function in libtirpc 0.2.3 and earlier allows remote attackers to cause a denial of service (rpcbind crash) via a Sun RPC request with crafted arguments that trigger a free of an invalid pointer.