RPC: Novell NetWare NFS Portmapper RPC Module Stack Overflow

A buffer overflow vulnerability exists in Novell NetWare NFS Portmapper daemon.The vulnerability is due to a boundary error when handling RPC calls. Unauthenticated attackers can exploit this vulnerability by sending crafted CALLIT RPC calls to a vulnerable Novell NetWare system. Successful exploitation would allow for arbitrary code injection and execution with the privileges of the vulnerable daemon program. The behaviour of the target system is dependent on the malicious code. An unsuccessful code execution attempt can lead to abnormal termination of the vulnerable daemon program, and potentially crash the target system.

Short Name
RPC:CALL-IT-OF
Severity
Major
Recommended
False
Recommended Action
Drop
Category
RPC
Keywords
Module NFS NetWare Novell Overflow Portmapper RPC Stack
Release Date
07/11/2011
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3324
False Positive
Unknown

Found a potential security threat?