rpcbind: deceive, enveigle and obfuscate

From: gilbertat_private
Date: Thu Jan 28 1999 - 05:03:14 PST

  • Next message: Lamont Granquist: "Re: Digital Unix 4.0 exploitable buffer overflows"

    -----BEGIN PGP SIGNED MESSAGE-----
    
    
    *** RPCBIND SECURITY ADVISORY ***
    
    Discovered by: Martin Rosa, mrosaat_private
    Authored by: Patrick Gilbert, gilbertat_private
    
    The vulnerable versions of rpcbind are contained in:
    
    - -Linux 2.0.34
    - -Irix 6.2
    - -Wietse's rpcbind 2.1 replacement (Wietse's warns
     the use of proper filtering to be used with his package, but did you
     really read the README?)
    - -Solaris 2.6 (you can add and delete services that were inserted remotely)
    - -Other version have yet to be tested.
    
    The problem:
    
    Rpcbind permits a remote attacker to insert and delete
    entries without superuser status by spoofing a source address.
    Ironically, it inserts the entries as being owned by superuser (wietse's
    rpcbind in this case).
    
    Consequences are terrible, to say the least. Tests were conducted
    with the pmap_tools available at the end of this advisory.
    
    The solution:
    
    Make sure you filter 127.0.0.1 and localnets at
    your border router. Bad router hygiene will lead to problems.
    
    The tools:
    
    A source of pmap_tools for linux, as well as technical details concerning
    this advisory can be obtained here:
    
    http://www.pgci.ca/emain.html
    
    Cheers,
    
    - --
    Patrick Gilbert				            +1 (514) 865-9178
    CEO, PGCI                                          http://www.pgci.ca
    Montreal (QC), Canada CE AB B2 18 E0 FE C4 33  0D 9A AC 18 30 1F D9 1A
    
    
    -----BEGIN PGP SIGNATURE-----
    Version: 2.6.2
    
    iQCVAwUBNrBgFvweOHTzUVddAQEO3AQAjjtefHTsCQX5GVXrgp3kOZK5/opckmyv
    nBcuL5hOl/vCwkr5SnCRD65FDYIh7NPH53Uj4MSf/xf8Bd28l8VxFG0R0GE3jnwN
    Z2lrrVXgZ0Xsmd+MHBnL38vVBdNHQpXb1U1eYCkClX/M6Y+BWnAvavw0wVxoO7bW
    4rzv7/c58eU=
    =z0pq
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 14:31:48 PDT