7.5
CVSSv3

CVE-2021-46828

Published: 20/07/2022 Updated: 07/11/2023
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

In libtirpc prior to 1.3.3rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled. This can, in turn, lead to an svc_run infinite loop without accepting new connections.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

libtirpc project libtirpc

debian debian linux 10.0

debian debian linux 11.0

Vendor Advisories

Debian Bug report logs - #1015873 libtirpc: CVE-2021-46828 Package: src:libtirpc; Maintainer for src:libtirpc is Josue Ortega <josue@debianorg>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Fri, 22 Jul 2022 20:57:01 UTC Severity: grave Tags: security Reply or subscribe to this bug Toggle useless mes ...
It was discovered that libtirpc, a transport-independent RPC library, does not properly handle idle TCP connections A remote attacker can take advantage of this flaw to cause a denial of service For the stable distribution (bullseye), this problem has been fixed in version 131-1+deb11u1 We recommend that you upgrade your libtirpc packages For ...
Synopsis Moderate: libtirpc security update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for libtirpc is now available for Red Hat Enterprise Linux 9Red Hat Product Security has rated this update as having a ...
Synopsis Important: Red Hat OpenShift Data Foundation 4130 security and bug fix update Type/Severity Security Advisory: Important Topic Updated images that include numerous enhancements, security, and bug fixes are now available in Red Hat Container Registry for Red Hat OpenShift Data Foundation 4130 on Red Hat Enterprise Linux 9Red Hat ...
In libtirpc before 133rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled This can, in turn, lead to an svc_run infinite loop without accepting new connections ...