Short Name |
PORTMAPPER:INFO:CALLIT-PROC |
---|---|
Severity |
Info |
Recommended |
No |
Category |
PORTMAPPER |
Keywords |
callit portmapper rpc |
Release Date |
2004/02/19 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This protocol anomaly triggers when the portmapper RPC service CALLIT procedure is detected. This procedure is an alternate way of invoking a remote procedure call to a service without directly communicating with the service. The Callit procedure can be dangerous, for example, when a client calls another service through Callit, the portmapper host server considers the remote request like a local one. This may not be a problem if the Callit procedure is properly configured. However, on poorly configured system, an attacker might be able to use it to access control checks, find servers offering vulnerable RPC services, and register or un-register services,
Successful exploitation of the vulnerability could allow a remote attacker to gain access to a server without authentication. An attacker could then further penetrate the system.