Short Name |
RPC:CALL-IT-OF |
---|---|
Severity |
High |
Recommended |
Yes |
Recommended Action |
Drop |
Category |
RPC |
Keywords |
Novell NetWare NFS Portmapper RPC Module Stack Overflow |
Release Date |
2011/07/11 |
Update Number |
1952 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
A buffer overflow vulnerability exists in Novell NetWare NFS Portmapper daemon.The vulnerability is due to a boundary error when handling RPC calls. Unauthenticated attackers can exploit this vulnerability by sending crafted CALLIT RPC calls to a vulnerable Novell NetWare system. Successful exploitation would allow for arbitrary code injection and execution with the privileges of the vulnerable daemon program. The behaviour of the target system is dependent on the malicious code. An unsuccessful code execution attempt can lead to abnormal termination of the vulnerable daemon program, and potentially crash the target system.