CVE-2018-14622
Summary
| CVE | CVE-2018-14622 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-08-30 13:29:00 UTC |
| Updated | 2023-11-07 02:52:00 UTC |
| Description | A null-pointer dereference vulnerability was found in libtirpc before version 0.3.3-rc3. The return value of makefd_xprt() was not checked in all instances, which could lead to a crash when the server exhausted the maximum number of available file descriptors. A remote attacker could cause an rpc-based application to crash by flooding it with new connections. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| 1620293 – (CVE-2018-14622) CVE-2018-14622 libtirpc: Segmentation fault in makefd_xprt return value in svc_vc.c |
CONFIRM |
bugzilla.redhat.com |
Issue Tracking, Third Party Advisory |
| USN-3759-1: libtirpc vulnerabilities | Ubuntu security notices | Ubuntu |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| git.linux-nfs.org Git - steved/libtirpc.git/commit |
CONFIRM |
git.linux-nfs.org |
Third Party Advisory |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
Third Party Advisory |
| USN-3759-2: libtirpc vulnerabilities | Ubuntu security notices |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| Access Denied |
CONFIRM |
bugzilla.novell.com |
Issue Tracking, Third Party Advisory |
| [SECURITY] [DLA 1487-1] libtirpc security update |
MLIST |
lists.debian.org |
Third Party Advisory |
| git.linux-nfs.org Git - steved/libtirpc.git/commit |
|
git.linux-nfs.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 670643 EulerOS Security Update for libtirpc (EulerOS-SA-2021-2401)