Computer Security
[EN] securityvulns.ru no-pyccku


rpcbind use-after-free
Published:05.10.2015
Source:
SecurityVulns ID:14701
Type:library
Threat Level:
8/10
Description:User-after-free conditions.
Affected:RPCBIND : rpcbind 0.2
CVE:CVE-2015-7236 (Use-after-free vulnerability in xprt_set_caller in rpcb_svc_com.c in rpcbind 0.2.1 and earlier allows remote attackers to cause a denial of service (daemon crash) via crafted packets, involving a PMAP_CALLIT code.)
Original documentdocumentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-15:24.rpcbind (05.10.2015)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod