Rapid7 Vulnerability & Exploit Database

RHSA-2003:089: Updated glibc packages fix vulnerabilities in RPC XDR decoder

Back to Search

RHSA-2003:089: Updated glibc packages fix vulnerabilities in RPC XDR decoder



Updated glibc packages are available to fix an integer overflow in the XDR decoder.

The glibc package contains standard libraries that are used by multiple programs on the system. Sun RPC is a remote procedure call framework that allows clients to invoke procedures in a server process over a network. XDR is a mechanism for encoding data structures for use with RPC. Glibc contains an XDR encoder/decoder derived from Sun's RPC implementation, which was demonstrated to be vulnerable to an integer overflow. An integer overflow is present in the xdrmem_getbytes() function of glibc 2.3.1 and earlier. Depending upon the application, this vulnerability could cause buffer overflows and may be exploitable leading to arbitrary code execution. All users should upgrade to these errata packages which contain patches to the glibc libraries and therefore are not vulnerable to these issues. Red Hat would like to thank eEye Digital Security for alerting us to this issue. The Red Hat Linux 8.0 errata packages also contain a number of bug fixes that are not security related. For details, see the list of bugzilla bugs fixed by this errata or the ChangeLog. [Updated 9 April 2003] Some bugs newly introduced by the Red Hat Linux 8.0 errata packages has been discovered, such as wine problems or problems with debugging threaded applications. Once the glibc upgrade has been completed, you must either reboot the system or restart all programs on the system (for example, by using telinit 1 and switching back to the old runlevel). Rebooting the system or restarting the system programs is necessary to avoid vulnerable glibc copies in memory and because changes in NSS internal interfaces which mean that one cannot mix old NSS modules or libresolv in an application with upgraded NSS modules or libresolv in one running application. If sshd is running so that the other services can be restarted remotely or for a remote reboot during an unattended glibc upgrade, glibc will also restart sshd.


  • redhat-upgrade-glibc
  • redhat-upgrade-glibc-common
  • redhat-upgrade-glibc-debug
  • redhat-upgrade-glibc-debug-static
  • redhat-upgrade-glibc-devel
  • redhat-upgrade-glibc-profile
  • redhat-upgrade-glibc-utils
  • redhat-upgrade-nscd

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center