| VID |
12036 |
| Severity |
40 |
| Port |
111 |
| Protocol |
TCP,UDP |
| Class |
RPC |
| Detailed Description |
The rpc.nisd daemon is vulnerable to a buffer overflow attack. The rpc.nisd daemon is an RPC service that implements the NIS and NIS+ services, which are designed to assist in the administration of networks by providing centralized management and distribution of information about users, machines, and other resources on the network. By submitting a long NIS+ argument, a remote attacker can overflow the buffer and execute arbitrary code on the system to gain root privileges.
* Warning: The NIS service may be crashed by a buffer overflow test. Therefore restarting the service is required in order to regain normal functionality.
* Platforms Affected: Solaris 2.3 Solaris 2.4 Solaris 2.5 Solaris 2.5.1 Solaris 2.6
* References: http://www.iss.net/security_center/static/962.php http://www.cert.org/advisories/CA-98.06.nisd.html |
| Recommendation |
Disable this service if you don't use it.
-- OR --
Apply the appropriate patch for your system, as listed in Sun Microsystems, Inc. Security Bulletin #00170, http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/170&type=0&nav=sec.sba |
| Related URL |
CVE-1999-0008 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|