RPC: Automount Daemon Buffer Overflow

This signature detects attempts to exploit a known vulnerability against the log functions of Automounter (amd), a daemon that automatically mounts filesystems when files or directories within that filesystem are accessed. Amd also unmounts non-active filesystems. Attackers can send a maliciously crafted long string to the AMQPROC_MOUNT procedure to overflow the buffer and gain root access.

Extended Description

There is a remotely exploitable buffer overflow condition in the amd daemon under several operating systems. Amd is a daemon that automatically mounts filesystems whenever a file or directory within that filesystem is accessed. Filesystems are automatically unmounted when they appear to have become quiescent. The vulnerability is in the log functions of the daemon. Red Hat Linux 4.2 shipped originally with a version of amd that is no longer being maintained. Since Red Hat Linux 5.0 we have switched to am-utils. This release of am-utils has been backported to 4.2 and it will obsolete the original 4.2 amd package.

Affected Products

Red_hat linux

Short Name
RPC:AUTOMOUNTD-OF
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
RPC
Keywords
Automount Buffer CVE-1999-0704 Daemon Overflow bid:614
Release Date
04/22/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
Port
RPC/300019
False Positive
Unknown
Vendors

Bsd

Red_hat

Freebsd

CVSS Score

9.3

Found a potential security threat?