Vulnerabilities > CVE-2008-4619 - Unspecified vulnerability in SUN Sunos 5.9
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
The RPC subsystem in Sun Solaris 9 allows remote attackers to cause a denial of service (daemon crash) via a crafted request to procedure 8 in program 100000 (rpcbind), related to the XDR_DECODE operation and the taddr2uaddr function. NOTE: this might be a duplicate of CVE-2007-0165.
Exploit-Db
description | Solaris 9 PortBind XDR-DECODE taddr2uaddr() Remote DoS Exploit. CVE-2008-4619. Dos exploit for solaris platform |
file | exploits/solaris/dos/6775.c |
id | EDB-ID:6775 |
last seen | 2016-02-01 |
modified | 2008-10-17 |
platform | solaris |
port | |
published | 2008-10-17 |
reporter | Federico L. Bossi Bonin |
source | https://www.exploit-db.com/download/6775/ |
title | Solaris 9 PortBind XDR-DECODE taddr2uaddr Remote DoS Exploit |
type | dos |
Nessus
NASL family Solaris Local Security Checks NASL id SOLARIS9_113319.NASL description SunOS 5.9: libnsl, nispasswdd patch. Date this patch was last updated by Sun : Jan/08/07 last seen 2016-09-26 modified 2011-10-24 plugin id 13535 published 2004-07-12 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=13535 title Solaris 9 (sparc) : 113319-27 code #%NASL_MIN_LEVEL 999999 # @DEPRECATED@ # # This script has been deprecated as the associated patch is not # currently a recommended security fix. # # Disabled on 2011/10/24. # # # (C) Tenable Network Security, Inc. # # if ( ! defined_func("bn_random") ) exit(0); include("compat.inc"); if(description) { script_id(13535); script_version("1.34"); script_name(english: "Solaris 9 (sparc) : 113319-27"); script_cve_id("CVE-2007-0165", "CVE-2008-4619"); script_set_attribute(attribute: "synopsis", value: "The remote host is missing Sun Security Patch number 113319-27"); script_set_attribute(attribute: "description", value: 'SunOS 5.9: libnsl, nispasswdd patch. Date this patch was last updated by Sun : Jan/08/07'); script_set_attribute(attribute: "solution", value: "You should install this patch for your system to be up-to-date."); script_set_attribute(attribute: "see_also", value: "http://download.oracle.com/sunalerts/1000297.1.html"); script_set_attribute(attribute: "cvss_vector", value: "CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_set_attribute(attribute:"plugin_publication_date", value: "2004/07/12"); script_cvs_date("Date: 2018/08/13 14:32:38"); script_set_attribute(attribute:"vuln_publication_date", value: "2007/01/09"); script_end_attributes(); script_summary(english: "Check for patch 113319-27"); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc."); family["english"] = "Solaris Local Security Checks"; script_family(english:family["english"]); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/Solaris/showrev"); exit(0); } # Deprecated. exit(0, "The associated patch is not currently a recommended security fix."); include("solaris.inc"); e += solaris_check_patch(release:"5.9", arch:"sparc", patch:"113319-27", obsoleted_by:"115695-02 112960-48 ", package:"SUNWarc", version:"11.9.0,REV=2002.04.06.15.27"); e += solaris_check_patch(release:"5.9", arch:"sparc", patch:"113319-27", obsoleted_by:"115695-02 112960-48 ", package:"SUNWarcx", version:"11.9.0,REV=2002.04.06.15.27"); e += solaris_check_patch(release:"5.9", arch:"sparc", patch:"113319-27", obsoleted_by:"115695-02 112960-48 ", package:"SUNWcsl", version:"11.9.0,REV=2002.04.06.15.27"); e += solaris_check_patch(release:"5.9", arch:"sparc", patch:"113319-27", obsoleted_by:"115695-02 112960-48 ", package:"SUNWcslx", version:"11.9.0,REV=2002.04.06.15.27"); e += solaris_check_patch(release:"5.9", arch:"sparc", patch:"113319-27", obsoleted_by:"115695-02 112960-48 ", package:"SUNWcstl", version:"11.9.0,REV=2002.04.06.15.27"); e += solaris_check_patch(release:"5.9", arch:"sparc", patch:"113319-27", obsoleted_by:"115695-02 112960-48 ", package:"SUNWcstlx", version:"11.9.0,REV=2002.04.06.15.27"); e += solaris_check_patch(release:"5.9", arch:"sparc", patch:"113319-27", obsoleted_by:"115695-02 112960-48 ", package:"SUNWhea", version:"11.9.0,REV=2002.04.06.15.27"); e += solaris_check_patch(release:"5.9", arch:"sparc", patch:"113319-27", obsoleted_by:"115695-02 112960-48 ", package:"SUNWnisu", version:"11.9.0,REV=2002.04.06.15.27"); if ( e < 0 ) { if ( NASL_LEVEL < 3000 ) security_hole(0); else security_hole(port:0, extra:solaris_get_report()); exit(0); } exit(0, "Host is not affected");
NASL family Solaris Local Security Checks NASL id SOLARIS8_108993.NASL description SunOS 5.8: LDAP2 client, libc, libthread a. Date this patch was last updated by Sun : Mar/29/07 last seen 2016-09-26 modified 2011-09-18 plugin id 13308 published 2004-07-12 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=13308 title Solaris 8 (sparc) : 108993-67 NASL family Solaris Local Security Checks NASL id SOLARIS9_X86_113719.NASL description SunOS 5.9_x86: libnsl, rpc.nispasswdd patc. Date this patch was last updated by Sun : Jan/05/07 last seen 2016-09-26 modified 2011-10-24 plugin id 13582 published 2004-07-12 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=13582 title Solaris 9 (x86) : 113719-21 NASL family Solaris Local Security Checks NASL id SOLARIS8_X86_108994.NASL description SunOS 5.8_x86: LDAP2 client, libc, libthre. Date this patch was last updated by Sun : Mar/30/07 last seen 2016-09-26 modified 2011-09-18 plugin id 13418 published 2004-07-12 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=13418 title Solaris 8 (x86) : 108994-67 NASL family Fedora Local Security Checks NASL id FEDORA_2008-9204.NASL description This update fixes : - Bug #468014 - CVE-2008-4619 libtirpc: rpcbind DoS in the taddr2uaddr XDR_DECODE Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 34671 published 2008-10-31 reporter This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/34671 title Fedora 9 : libtirpc-0.1.7-20.fc9 (2008-9204)
References
- http://secunia.com/advisories/32475
- http://securityreason.com/securityalert/4440
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-200412-1
- http://www.openwall.com/lists/oss-security/2008/10/28/2
- http://www.openwall.com/lists/oss-security/2008/10/29/1
- http://www.openwall.com/lists/oss-security/2008/10/31/2
- http://www.vupen.com/english/advisories/2008/2945
- https://exchange.xforce.ibmcloud.com/vulnerabilities/46057
- https://www.exploit-db.com/exploits/6775
- https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00819.html