RPC ypupdated daemon allows remote commands execution as root |
---|
Risk Level: | High | Check or Attack Name: rpcupdate |
---|---|---|
Platforms: | AIX: 3.2, AIX: 4.1, IRIX: 3.x, IRIX: 4.x, IRIX: 5.x, IRIX: 6.0.1, NEC EWS-UX/V, NEC UP-UX/V, NEC UX/4800, SunOS: 4.1.x, HPUX: 10.01, HPUX: 10.10, IRIX: 6.0, HPUX: 10.20 | |
Description: | The NIS update daemon rpc.ypupdated contains a vulnerability in how it passes commands to certain function calls, which allows a remote attacker to trick the service into executing arbitrary commands on the system with root privileges. Exploit information for this hole has been made widely available. |
|
Remedy: | Obtain and install a patch from your vendor as soon as possible. |
|
References: | CERT Advisory CA-95.17, rpc.ypupdated Vulnerability, http://www.cert.org/advisories/CA-95.17.rpc.ypupdated.vul.html Silicon Graphics Inc. Security Advisory 19951201-01-P, Avalon Security Research - rpc.ypupdate slammer exploit, ftp://sgigate.sgi.com/security/19951201-01-P |
Know Your Risks |