CVE-2017-8779 exploit on open rpcbind port could lead to remote DoS
Medium
E
Endless Group
Submitted None
Team Summary
Official summary from Endless Group
An open port that was not discovered during our regular scan would have allowed users to abuse rpcbind and perform certain remote commands including excessive usage of system resources.
Actions:
Reported by
b039f6018eb9056011859b0
Vulnerability Details
Technical details and impact analysis
## Summary:
An open rpcbind port on https://da.theendlessweb.com allows for possible exploitation by an existing Metasploit module. This could lead to large and unfreed memory allocations for XDR strings.
## Description:
Port scanning on 149.56.38.19 which is the IP of https://da.theendlessweb.com shows open port 111 which runs 'rpcbind'. By using the auxiliary module auxiliary/dos/rpc/rpcbomb in Metasploit, it is possible to exploit the port and cause large memory allocations for XDR strings. Excessive memory allocations could exhaust the systems memory leading to a Denial of Service.
As can be seen in the following screenshot:
(please note that I did not expect the module to work therefore I continued the test, I am aware that causing a DoS is a serious offense and do not intend to do any damage)
F711567
The exploit was completed successfully. I did not continue any further out of fear of unintended damage to the site.
## Steps To Reproduce:
1. Open the Metasploit framework and type 'use auxiliary/dos/rpc/rpcbomb'
2. set RHOSTS to 149.56.38.19 and RPORT to 111
3. Type 'exploit'
## Supporting Material/References:
Some reference sites:
https://www.rapid7.com/db/modules/auxiliary/dos/rpc/rpcbomb
https://access.redhat.com/solutions/3025811
##Solution/ Mitigation
Close or filter port 111
## Impact
An attacker could use this vulnerability to trigger large unfreed memory allocations on the system leading to a remote Denial of Service.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Uncontrolled Resource Consumption