Short Name |
RPC:RPC.STATD:RPC-STATD-OF |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
RPC |
Keywords |
Buffer Overflow in rpc.statd |
Release Date |
2003/04/22 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability against statd, the RPC NFS status daemon. Statd communicates status information. Attackers can send a malicious RPC request to overflow the buffer and gain root access.
Statd is the RPC NFS status daemon. It is used to communicate status information to other services or host. The version of statd shipped with many unix implementations contains a buffer overflow condition. This overflow condition exists in the handling of 'SM_MON' RPC requests. Any attacker to successfully exploit this vulnerability would gain root privileges on the target host.