Korean
<< Back
VID 12036
Severity 40
Port 111
Protocol TCP,UDP
Class RPC
Detailed Description The rpc.nisd daemon is vulnerable to a buffer overflow attack.
The rpc.nisd daemon is an RPC service that implements the NIS and NIS+ services, which are designed to assist in the administration of networks by providing centralized management and distribution of information about users, machines, and other resources on the network.
By submitting a long NIS+ argument, a remote attacker can overflow the buffer and execute arbitrary code on the system to gain root privileges.

* Warning: The NIS service may be crashed by a buffer overflow test. Therefore restarting the service is required in order to regain normal functionality.

* Platforms Affected:
Solaris 2.3
Solaris 2.4
Solaris 2.5
Solaris 2.5.1
Solaris 2.6

* References:
http://www.iss.net/security_center/static/962.php
http://www.cert.org/advisories/CA-98.06.nisd.html
Recommendation Disable this service if you don't use it.

-- OR --

Apply the appropriate patch for your system, as listed in Sun Microsystems, Inc. Security Bulletin #00170, http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/170&type=0&nav=sec.sba
Related URL CVE-1999-0008 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)