Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

RPC:RPC.STATD:RPC-STATD-OF

Severity

High

Recommended

No

Recommended Action

Drop

Category

RPC

Keywords

Buffer Overflow in rpc.statd

Release Date

2003/04/22

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

RPC: Buffer Overflow in rpc.statd


This signature detects attempts to exploit a known vulnerability against statd, the RPC NFS status daemon. Statd communicates status information. Attackers can send a malicious RPC request to overflow the buffer and gain root access.

Extended Description

Statd is the RPC NFS status daemon. It is used to communicate status information to other services or host. The version of statd shipped with many unix implementations contains a buffer overflow condition. This overflow condition exists in the handling of 'SM_MON' RPC requests. Any attacker to successfully exploit this vulnerability would gain root privileges on the target host.

Affected Products

  • IBM AIX 3.2.0
  • IBM AIX 4.1.0
  • SCO Unixware 7.0.0
  • SCO Unixware 7.0.1
  • SCO Unixware 7.1.0
  • SCO Unixware 7.1.1
  • SGI IRIX 5.0.0
  • SGI IRIX 5.0.1
  • SGI IRIX 5.1.0
  • SGI IRIX 5.1.1
  • SGI IRIX 5.2.0
  • SGI IRIX 5.3.0
  • Sun Solaris 2.4
  • Sun Solaris 2.4_x86
  • Sun Solaris 2.5
  • Sun Solaris 2.5.1
  • Sun Solaris 2.5.1_x86
  • Sun Solaris 2.5_x86

References

  • BugTraq: 127
  • CVE: CVE-1999-0018
  • URL: http://www.cert.org/advisories/CA-97.26.statd.html
  • URL: http://securityfocus.com/bid/127
  • URL: http://xforce.iss.net/static/696.php

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out