| VID |
12033 |
| Severity |
40 |
| Port |
|
| Protocol |
UDP |
| Class |
RPC |
| Detailed Description |
The Linux rpc.statd/rpc.kstatd daemon is vulnerable to a format string attack. rpc.statd/rpc.kstatd is the NFS file-locking status monitor. Remote Procedure Call (RPC) statd maintains state information in cooperation with RPC lockd to provide crash and recovery functionality for file locking across the Network File System (NFS). Due to a flaw in the program's logging system, the rpc.statd/rpc.kstatd server that ships with most distributions of Linux could allow an attacker to execute code with root privileges. A call to syslog() in the program takes data directly without any filtering from the remote user; this data could include printf()-style format specifiers. By sending a specially-crafted RPC message to vulnerable servers, an attacker could execute arbitrary code with root privileges.
* Warning: The rpc.statd daemon may be crashed by a format string test. Therefore restarting the service is required in order to regain normal functionality.
* References: http://online.securityfocus.com/bid/1480 http://www.iss.net/security_center/static/4939.php
Platforms Affected: Conectiva Linux: All Versions Debian Linux 2.2 Debian Linux 2.3 Mandrake Linux 7.0 Mandrake Linux 7.1 Red Hat Linux 6.0 Red Hat Linux 6.1 Red Hat Linux 6.2 SuSE Linux 6.1 SuSE Linux 6.2 SuSE Linux 6.3 SuSE Linux 6.4 |
| Recommendation |
Disable the 'rpc.statd' rpc service if your system is not acting as either an NFS client or server.
-- OR --
Apply the appropriate patch for your operating system.
For Linux-Mandrake: Upgrade to the latest version of nfs-utils (0.1.9.1 or later), as listed in Linux-Mandrake Security Update Advisory MDKSA-2000:021, http://online.securityfocus.com/archive/1/70701
For Red Hat Linux: Upgrade to the latest version of nfs-utils (0.1.9.1 or later), as listed in Red Hat, Inc. Security Advisory RHSA-2000:043-02, http://www.redhat.com/support/errata/RHSA-2000-043-03.html
For Conectiva Linux: Upgrade to the latest version of nfs-utils (0.1.9.1 or later), as listed in Conectiva Linux Security Announcement CLSA-2000:250, http://online.securityfocus.com/advisories/2456
For Debian Linux: Upgrade to the latest version of nfs-utils (0.1.9.1 or later), as listed in Debian Security Advisory 20000719a, http://www.debian.org/security/2000/20000719a
For Trustix Linux: Upgrade to the latest version of nfs-utils (0.1.9.1 or later), as listed in Trustix Security Advisory - nfs-utils, http://online.securityfocus.com/archive/1/70557
For other distributions: Contact your vendor for upgrade or patch information. |
| Related URL |
CVE-2000-0666 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|