RPC: Buffer Overflow in rpc.statd

This signature detects attempts to exploit a known vulnerability against statd, the RPC NFS status daemon. Statd communicates status information. Attackers can send a malicious RPC request to overflow the buffer and gain root access.

Extended Description

Statd is the RPC NFS status daemon. It is used to communicate status information to other services or host. The version of statd shipped with many unix implementations contains a buffer overflow condition. This overflow condition exists in the handling of 'SM_MON' RPC requests. Any attacker to successfully exploit this vulnerability would gain root privileges on the target host.

Affected Products

Sgi irix

Short Name
RPC:RPC.STATD:RPC-STATD-OF
Severity
Major
Recommended
False
Recommended Action
Drop
Category
RPC
Keywords
Buffer CVE-1999-0018 Overflow bid:127 in rpc.statd
Release Date
04/22/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
Port
RPC/100024
False Positive
Unknown
Vendors

Sgi

Sun

Sco

Ibm

CVSS Score

10.0

Found a potential security threat?