Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

RPC:YPUPDATED-CMD-INJ

Severity

High

Recommended

No

Recommended Action

Drop

Category

RPC

Keywords

Sun Solaris rpc.ypupdated Command Injection Vulnerability

Release Date

2010/09/28

Update Number

1780

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

RPC: Sun Solaris rpc.ypupdated Command Injection Vulnerability


This signature detects attempts to exploit a known vulnerability against Sun Solaris. A successful attack can lead to arbitrary code execution.

Extended Description

Sun Solaris is prone to an arbitrary command execution vulnerability because it fails to adequately sanitize user-supplied data to 'rpc.ypupdated'. Attackers can leverage this issue to execute arbitrary commands on vulnerable computers. Successful exploits will compromise the compromise the computer. This issue occurs only when 'rpc.ypupdated' is started using the '-i' command line switch. This switch is not used by default. Sun Solaris 10 is vulnerable; other versions may also be affected. Reports indicate that this issue was originally discovered in 1994. This BID is being retired as it is a duplicate of the vulnerability discussed in BID 1749 (Multiple Vendor RPC.YPUpdated Command Execution Vulnerability).

Affected Products

  • Sun Solaris 10 Sparc

References

  • BugTraq: 28383
  • CVE: CVE-1999-0208

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out