RPC: Buffer Overflow in rpc.statd
This signature detects attempts to exploit a known vulnerability against statd, the RPC NFS status daemon. Statd communicates status information. Attackers can send a malicious RPC request to overflow the buffer and gain root access.
Extended Description
Statd is the RPC NFS status daemon. It is used to communicate status information to other services or host. The version of statd shipped with many unix implementations contains a buffer overflow condition. This overflow condition exists in the handling of 'SM_MON' RPC requests. Any attacker to successfully exploit this vulnerability would gain root privileges on the target host.
Affected Products
Sgi irix
References
BugTraq: 127
CVE: CVE-1999-0018
URL: http://www.cert.org/advisories/CA-97.26.statd.html http://securityfocus.com/bid/127 http://xforce.iss.net/static/696.php
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Sgi
Sun
Sco
Ibm
10.0