Executive Summary

Informations
Name CVE-2013-1950 First vendor Publication 2013-07-09
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:N/A:P)
Cvss Base Score 4.3 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The svc_dg_getargs function in libtirpc 0.2.3 and earlier allows remote attackers to cause a denial of service (rpcbind crash) via a Sun RPC request with crafted arguments that trigger a free of an invalid pointer.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1950

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-399 Resource Management Errors

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:21121
 
Oval ID: oval:org.mitre.oval:def:21121
Title: RHSA-2013:0884: libtirpc security update (Moderate)
Description: The svc_dg_getargs function in libtirpc 0.2.3 and earlier allows remote attackers to cause a denial of service (rpcbind crash) via a Sun RPC request with crafted arguments that trigger a free of an invalid pointer.
Family: unix Class: patch
Reference(s): RHSA-2013:0884-01
CESA-2013:0884
CVE-2013-1950
Version: 4
Platform(s): Red Hat Enterprise Linux 6
CentOS Linux 6
Product(s): libtirpc
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:24021
 
Oval ID: oval:org.mitre.oval:def:24021
Title: ELSA-2013:0884: libtirpc security update (Moderate)
Description: The svc_dg_getargs function in libtirpc 0.2.3 and earlier allows remote attackers to cause a denial of service (rpcbind crash) via a Sun RPC request with crafted arguments that trigger a free of an invalid pointer.
Family: unix Class: patch
Reference(s): ELSA-2013:0884-01
CVE-2013-1950
Version: 6
Platform(s): Oracle Linux 6
Product(s): libtirpc
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27505
 
Oval ID: oval:org.mitre.oval:def:27505
Title: DEPRECATED: ELSA-2013-0884 -- libtirpc security update (moderate)
Description: [0.2.1-6_4] - Removed a svc_freeargs() call from svc_dg_freeargs() (bz 953735)
Family: unix Class: patch
Reference(s): ELSA-2013-0884
CVE-2013-1950
Version: 4
Platform(s): Oracle Linux 6
Product(s): libtirpc
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8

Nessus® Vulnerability Scanner

Date Description
2016-02-19 Name : The remote device is missing a vendor-supplied security patch.
File : f5_bigip_SOL19157044.nasl - Type : ACT_GATHER_INFO
2014-11-08 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2013-1076.nasl - Type : ACT_GATHER_INFO
2013-09-04 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2013-199.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2013-0884.nasl - Type : ACT_GATHER_INFO
2013-05-31 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2013-0884.nasl - Type : ACT_GATHER_INFO
2013-05-31 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2013-0884.nasl - Type : ACT_GATHER_INFO
2013-05-31 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20130530_libtirpc_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2013-04-29 Name : The remote Fedora host is missing a security update.
File : fedora_2013-6262.nasl - Type : ACT_GATHER_INFO
2003-03-19 Name : Arbitrary code may be run on the remote server.
File : rpc_xdrmem_bytes.nasl - Type : ACT_DESTRUCTIVE_ATTACK

Sources (Detail)

http://git.infradead.org/users/steved/libtirpc.git/commitdiff/a9f437119d79a43...
http://rhn.redhat.com/errata/RHSA-2013-0884.html
https://bugzilla.redhat.com/show_bug.cgi?id=948378
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
Date Informations
2024-11-28 12:34:28
  • Multiple Updates
2024-08-02 12:23:24
  • Multiple Updates
2024-08-02 01:06:56
  • Multiple Updates
2024-02-02 01:22:43
  • Multiple Updates
2024-02-01 12:06:43
  • Multiple Updates
2023-09-05 12:21:28
  • Multiple Updates
2023-09-05 01:06:37
  • Multiple Updates
2023-09-02 12:21:29
  • Multiple Updates
2023-09-02 01:06:42
  • Multiple Updates
2023-08-22 12:19:12
  • Multiple Updates
2022-10-11 01:06:25
  • Multiple Updates
2022-09-20 21:27:29
  • Multiple Updates
2021-05-04 12:24:46
  • Multiple Updates
2021-04-22 01:29:40
  • Multiple Updates
2020-05-23 00:36:47
  • Multiple Updates
2016-02-20 13:27:15
  • Multiple Updates
2014-11-08 13:30:44
  • Multiple Updates
2014-02-17 11:18:40
  • Multiple Updates
2013-10-11 21:23:24
  • Multiple Updates
2013-07-10 21:19:38
  • Multiple Updates
2013-07-10 17:28:15
  • Multiple Updates
2013-07-10 00:27:09
  • First insertion