Korean
<< Back
VID 17013
Severity 30
Port 1024
Protocol TCP
Class RPC
Detailed Description The NFS (Network File System) lock daemon in some Linux distributions is vulnerable to a denial of service attack. By connecting to the port rpc.lockd (usually port 1024) is running on, and supplying random input, it will cause lockd to stop with an error.

Platforms Affected:
Linux Debian 2.1 ~ 2.2
Linux Red Hat 6.0 ~ 6.2
Linux Mandrake 6.0 ~ 6.1, 7.0 ~ 7.1

* References:
http://www.iss.net/security_center/static/5050.php
http://www.securityfocus.com/archive/1/64258
Recommendation Disable the 'nlockmgr' rpc service if your system is not acting as either an NFS client or server.
rpc.lockd will normally listen on port 1024. You can also limit access to this service using ipfw
Related URL CVE-2000-0508 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)