Rapid7 Vulnerability & Exploit Database

CESA-2002:224: ypserv security update

Back to Search

CESA-2002:224: ypserv security update

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
11/04/2002
Created
07/25/2018
Added
03/12/2010
Modified
07/04/2017

Description

Updated ypserv packages which fix a memory leak are now available for Red Hat Linux Advanced Server. [Updated 08 Jan 2003] Added fixed packages for the Itanium (IA64) architecture. [Updated 06 Feb 2003] Added fixed packages for Advanced Workstation 2.1

ypserv is an NIS authentication server. ypserv versions before 2.5 contain a memory leak that can be triggered remotely. When someone requests a map that doesn't exist, a previous mapname may be leaked. This happens, for instance, if you run "ypmatch foo aaaaaaaaaaaaaaaaaaaa". Repeated runs will result in the yp server using more and more memory, and running more slowly. It could also result in ypserv being killed due to the system being out of memory. This errata updates CentOS Advanced Server 2.1 to a patched version of ypserv that doesn't have the memory leak.

Solution(s)

  • centos-upgrade-ypserv

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;