OS: Linux x86 ntalkd Buffer Overflow

This signature detects attempts to exploit a known vulnerability in the name lookup facility in the talk daemon (talkd) running on LINUX. The talkd provides conversation between users. It also notifies users that another user wishes to establish a chat session. Because talkd must perform a name lookup of the initiating host, attackers can send a phony host name to talkd to overflow the buffer and gain root access.

Extended Description

The program talk is used to provide a two-way screen-oriented conversation between users. The talkd daemon is used to notify a user that another users wishes to establish a chat session. As part of this process, talkd must perform a name lookup of the initiating host. Due to a buffer overflow condition in talkd related to the name lookup facility, an unauthorized user may be able to pass bogus hostname information to talkd and gain root access.

Affected Products

Nec ux/4800

Short Name
OS:LINUXX86:NTALKD-OF
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
OS
Keywords
Buffer CVE-1999-0048 Linux Overflow bid:210 ntalkd x86
Release Date
04/22/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
Port
TCP/518
False Positive
Unknown
Vendors

Red_hat

Ibm

Hp

Nec

Sgi

Freebsd

Bsd

Debian

CVSS Score

10.0

Found a potential security threat?