CVE-2017-8779 exploit on open rpcbind port could lead to remote DoS

Disclosed: 2020-02-12 12:24:26 By b039f6018eb9056011859b0 To endless_group
Medium
Vulnerability Details
## Summary: An open rpcbind port on https://da.theendlessweb.com allows for possible exploitation by an existing Metasploit module. This could lead to large and unfreed memory allocations for XDR strings. ## Description: Port scanning on 149.56.38.19 which is the IP of https://da.theendlessweb.com shows open port 111 which runs 'rpcbind'. By using the auxiliary module auxiliary/dos/rpc/rpcbomb in Metasploit, it is possible to exploit the port and cause large memory allocations for XDR strings. Excessive memory allocations could exhaust the systems memory leading to a Denial of Service. As can be seen in the following screenshot: (please note that I did not expect the module to work therefore I continued the test, I am aware that causing a DoS is a serious offense and do not intend to do any damage) F711567 The exploit was completed successfully. I did not continue any further out of fear of unintended damage to the site. ## Steps To Reproduce: 1. Open the Metasploit framework and type 'use auxiliary/dos/rpc/rpcbomb' 2. set RHOSTS to 149.56.38.19 and RPORT to 111 3. Type 'exploit' ## Supporting Material/References: Some reference sites: https://www.rapid7.com/db/modules/auxiliary/dos/rpc/rpcbomb https://access.redhat.com/solutions/3025811 ##Solution/ Mitigation Close or filter port 111 ## Impact An attacker could use this vulnerability to trigger large unfreed memory allocations on the system leading to a remote Denial of Service.
Actions
View on HackerOne
Report Stats
  • Report ID: 791893
  • State: Closed
  • Substate: resolved
  • Upvotes: 9
Share this report