The portmapper may act as a proxy and redirect service requests from an attacker, making the request appear to come from the local host, possibly bypassing authentication that would otherwise have taken place. For example, NFS file systems could be mounted through the portmapper despite export restrictions.
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 1999-09-29T04:00:00
Updated: 2022-08-17T06:50:46
Reserved: 1999-06-07T00:00:00
Link: CVE-1999-0168
JSON object: View
NVD Information
Status : Modified
Published: 1992-06-04T04:00:00.000
Modified: 2022-08-17T07:15:12.890
Link: CVE-1999-0168
JSON object: View
Redhat Information
No data.
CWE