Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

RPC:CALL-IT-OF

Severity

High

Recommended

Yes

Recommended Action

Drop

Category

RPC

Keywords

Novell NetWare NFS Portmapper RPC Module Stack Overflow

Release Date

2011/07/11

Update Number

1952

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

RPC: Novell NetWare NFS Portmapper RPC Module Stack Overflow


A buffer overflow vulnerability exists in Novell NetWare NFS Portmapper daemon.The vulnerability is due to a boundary error when handling RPC calls. Unauthenticated attackers can exploit this vulnerability by sending crafted CALLIT RPC calls to a vulnerable Novell NetWare system. Successful exploitation would allow for arbitrary code injection and execution with the privileges of the vulnerable daemon program. The behaviour of the target system is dependent on the malicious code. An unsuccessful code execution attempt can lead to abnormal termination of the vulnerable daemon program, and potentially crash the target system.

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out