Rapid7 Vulnerability & Exploit Database

RHSA-2002:223: Updated ypserv packages fixes memory leak

Back to Search

RHSA-2002:223: Updated ypserv packages fixes memory leak

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
11/04/2002
Created
07/25/2018
Added
10/28/2005
Modified
07/04/2017

Description

Updated ypserv packages which fix a memory leak are now available for Red Hat Linux 7.x and 6.2.

ypserv is an NIS authentication server. ypserv versions before 2.5 contain a memory leak that can be triggered remotely. When someone requests a map that doesn't exist, a previous mapname may be leaked. This happens, for instance, if you run "ypmatch foo aaaaaaaaaaaaaaaaaaaa". Repeated runs will result in the yp server using more and more memory, and running more slowly. It could also result in ypserv being killed due to the system being out of memory. This errata updates Red Hat Linux 7.x to ypserv version 2.5 which doesn't have the memory leak, and updates Red Hat Linux 6.x to a patched version of ypserv that doesn't have the memory leak.

Solution(s)

  • redhat-upgrade-ypserv

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;