| VID |
17013 |
| Severity |
30 |
| Port |
1024 |
| Protocol |
TCP |
| Class |
RPC |
| Detailed Description |
The NFS (Network File System) lock daemon in some Linux distributions is vulnerable to a denial of service attack. By connecting to the port rpc.lockd (usually port 1024) is running on, and supplying random input, it will cause lockd to stop with an error.
Platforms Affected: Linux Debian 2.1 ~ 2.2 Linux Red Hat 6.0 ~ 6.2 Linux Mandrake 6.0 ~ 6.1, 7.0 ~ 7.1
* References: http://www.iss.net/security_center/static/5050.php http://www.securityfocus.com/archive/1/64258 |
| Recommendation |
Disable the 'nlockmgr' rpc service if your system is not acting as either an NFS client or server. rpc.lockd will normally listen on port 1024. You can also limit access to this service using ipfw |
| Related URL |
CVE-2000-0508 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|