Note: This is an archival copy of Security Sun Alert 200412 as previously published on http://sunsolve.sun.com.|
Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1000297.1.
Solaris 9 Operating System
Solaris 8 Operating System
Date of Resolved Release
A Security Vulnerability in Solaris libnsl(3LIB) may lead to a Denial of Service (DoS) to the rpcbind(1M) Service
A security vulnerability in Solaris 8 or 9 handling of some malformed RPC requests may allow a local or remote unprivileged user to kill the rpcbind(1M) server, causing a Denial of Service (DoS) condition.
Sun acknowledges, with thanks, the BlueLane Research Team for bringing this issue to our attention.
This issue is also referenced in the following documents:
CVE-2007-0165 at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0165
2. Contributing Factors
This issue can occur in the following releases:
Note: Solaris 10 is not affected by this issue.
Should the described issue occur, rpcbind(1M) will core dump after receiving a malformed RPC request, and the affected system will refuse connections to the rpcbind port. As a result, no new RPC based services can be provided by the affected system until a manual restart of the rpcbind service is performed. Depending on the coreadm(1M) settings, a core file may also be generated in the configured location.
There is no workaround for this issue. Please see the Resolution section below.
This issue is addressed in the following releases:
For more information on Security Sun Alerts, see 1009886.1.
Copyright 2000-2008 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved.
29-Jan-2007: Updated Impact section
29-Oct-2008: Updated Impact section for CVE reference
12-Nov-2008: Updated Impact section to add 2nd CVE reference
This solution has no attachment