Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0461: Versions of rpcbind including Linux, IRIX, and Wietse Venema's rpcbind allow a remote attacker to in

0
High
VulnerabilityCVE-1999-0461cve-1999-0461rce
Published: Thu Jan 28 1999 (01/28/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: sgi
Product: irix

Description

Versions of rpcbind including Linux, IRIX, and Wietse Venema's rpcbind allow a remote attacker to insert and delete entries by spoofing a source address.

AI-Powered Analysis

AILast updated: 06/28/2025, 12:55:20 UTC

Technical Analysis

CVE-1999-0461 is a critical vulnerability affecting versions of rpcbind, including those used in Linux, IRIX, and Wietse Venema's rpcbind implementation. Rpcbind is a server that converts RPC program numbers into universal addresses, facilitating remote procedure calls over a network. The vulnerability allows a remote attacker to spoof the source address of a request and thereby insert or delete entries in the rpcbind service. This manipulation can disrupt the mapping of RPC services, potentially allowing the attacker to redirect RPC requests or cause denial of service by removing legitimate mappings. The vulnerability requires no authentication and can be exploited remotely with low complexity, as it relies on source address spoofing. The CVSS score of 10 reflects the critical nature of this flaw, with complete compromise of confidentiality, integrity, and availability possible. Despite its age, the vulnerability remains relevant in environments still running unpatched or legacy rpcbind versions, particularly version 2.6.20.1 and similar. No official patches are available, increasing the risk for systems that have not migrated to more secure rpcbind implementations or alternatives.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to severe disruptions in network services relying on RPC, including critical infrastructure, enterprise applications, and legacy systems. The ability to spoof rpcbind entries can enable attackers to redirect RPC traffic, potentially intercepting sensitive data or injecting malicious commands, thus compromising confidentiality and integrity. Additionally, deletion of legitimate entries can cause denial of service, impacting availability of essential services. Organizations in sectors such as telecommunications, government, finance, and manufacturing that depend on RPC for internal or external communications are particularly at risk. Given the lack of patches, the presence of legacy systems in European networks could prolong exposure. Furthermore, the critical CVSS rating underscores the potential for widespread impact if exploited in a coordinated attack, especially in environments where network segmentation and ingress filtering are insufficient to prevent spoofed packets.

Mitigation Recommendations

To mitigate this threat, European organizations should first identify all systems running vulnerable rpcbind versions, especially legacy Linux and IRIX systems. Immediate steps include disabling rpcbind where it is not essential, or restricting its access to trusted internal networks using firewall rules and network segmentation. Implementing ingress and egress filtering to block spoofed IP packets at network boundaries is crucial to prevent attackers from exploiting source address spoofing. Where rpcbind is necessary, consider migrating to updated RPC implementations that have addressed this vulnerability or alternative service discovery mechanisms. Network monitoring should be enhanced to detect anomalous rpcbind traffic or unauthorized changes to RPC mappings. Given the absence of official patches, organizations should also evaluate the feasibility of isolating vulnerable systems or replacing them with supported platforms. Regular security audits and penetration testing focusing on RPC services can help identify exploitation attempts early.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32bb6fd31d6ed7dedc8

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 6/28/2025, 12:55:20 PM

Last updated: 2/7/2026, 1:02:13 PM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats