https://bugzilla.redhat.com/show_bug.cgi?id=948378 https://rhn.redhat.com/errata/RHSA-2013-0884.html "A flaw was found in the way libtirpc decoded RPC requests. A specially-crafted RPC request could cause libtirpc to attempt to free a buffer provided by an application using the library, even when the buffer was not dynamically allocated. This could cause an application using libtirpc, such as rpcbind, to crash. (CVE-2013-1950)" Fix here: http://git.infradead.org/users/steved/libtirpc.git/commitdiff/a9f437119d79a438cb12e510f3cadd4060102c9f Reproducible: Steps to Reproduce:
Whoops. The code is not present in libtirpc-0.2.2. No way to test as I don't own a Nessus license.
Yes, I already looked into this last week, the code isn't present in 0.2.2.
Status: NEW => RESOLVEDCC: (none) => luigiwalserResolution: (none) => INVALID