Permanent CPU Hog During TCP Flood on Portmap and RPC.STATD
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
eglibc (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
I’m investigating a Permanent CPU DoS resulting from a TCP flood attack against the TCP ports bound to the Portmap and RPC.STATD services in Ubuntu 10.04. I’ve found a similar issue on RedHat and it appears the vulnerability/bug is in glibc (https:/
The glibc version installed on my Ubuntu 10.04 server is “libglib2.0-0 2.24.1-0ubuntu1”.
To reproduce, download the following tools from the internet and execute the following commands:
1. arpspoof -i eth1 -t <ubuntu-ip-address> <source-
2. srvr -SAa -i eth1 <source-
3. hping2 <ubuntu-ip-address> -p <port-number> -S -a <source-
Note: portnumber is 111 for portmap and the port dynamically bound to rpc.statd (via netstat -lnup | grep rpc.statd)
Thanks,
John Zimmerman
Hi all,
this is Stefano from Cisco PSIRT. As John mentioned this is affecting one of our product. As per our policy we would need to disclose this vulnerability however we are on hold waiting for your evaluation.
Can you please let me know the status?
If it can help, we have reported a similar issue to RH which confirmed the issue.
Thanks
Stefano