Korean
<< Back
VID 17036
Severity 30
Port
Protocol UDP
Class RPC
Detailed Description The rpc.statd daemon is vulnerable to a remote file creation and removal attack.
rpc.statd (or simply statd on some machines) is the NFS file-locking status monitor. Remote Procedure Call (RPC) statd maintains state information in cooperation with RPC lockd to provide crash and recovery functionality for file locking across the Network File System (NFS).
Statd does not validate information received from a remote lockd. By sending to the statd service a malformed request including references to the parent directory ("../"), an attacker can provide false information to the rpc.statd, allowing the creation of a file in an arbitrary directory on the host. This can be used to overwrite pre-existing files or create new files on the host.

* NOTE: There is no method to remotely verify whether this attack has completed successfully. If the check completes without receiving an error message from the host being scanned, that system will be reported as being vulnerable. This scanner attempts to create a file called 'by_scanner.statd.vulnerability' in /tmp directory. If this file exists on the specified host after the scan is complete, then the host is vulnerable.

* References:
http://www.iss.net/security_center/static/109.php
http://www.cert.org/advisories/CA-1996-09.html

Platforms Affected:
AIX: All Versions
DG/UX: All Versions
HP-UX 10.x
HP-UX 9.x
IRIX: All Versions
NCR MP-RAS: All Versions
NEC EWS-UX/V: All Versions
NEC UP-UX/V: All Versions
NEC UX/4800: All Versions
NeXTSTEP: All Versions
Solaris: 2.4, 2.5, 2.5.1
Recommendation Disable the 'rpc.statd' rpc service if your system is not acting as either an NFS client or server.

-- OR --

Apply the appropriate patch for your operating system.

For Hewlett-Packard:
Apply the appropriate patch for your system, as listed in Hewlett-Packard Security Bulletin HPSBUX9607-032 at http://us-support.external.hp.com/index.html. Patch numbers are also listed below, for your convenience:

Series 300/400 HP-UX 9.X: PHNE_7371 and PHNE_7372
Series 700/800 HP-UX 9.X: PHNE_7072
Series 700/800 HP-UX 10.X: PHNE_7073
Series 700 HP-UX 9.08 BLS: PHNE_8015
Series 700 HP-UX 9.09 BLS: PHNE_8016
Series 700 HP-UX 9.09+ BLS: PHNE_8017
Series 700 HP-UX 10.09 CMW: PHNE_8018
Series 700 HP-UX 10.09.01 CMW: PHNE_8019
Series 700 HP-UX 10.16 CMW: PHNE_8020

For AIX 3.2:
More information is available in APAR IX56056, available from the IBM RS/6000 Support Web site, http://techsupport.services.ibm.com/rs6000/aix.CAPARdb

For AIX 4.1:
More information is available in APAR IX55931, available from the IBM RS/6000 Support Web site, http://techsupport.services.ibm.com/rs6000/aix.CAPARdb

For Sony NEWS-OS:
Apply the appropriate patch for your system, as listed in CERT Advisory CA-1996-09, http://www.cert.org/advisories/CA-1996-09.html

For SunOS:
Apply the appropriate patch for your system, as listed in Sun Microsystems, Inc. Security Bulletin #00135, http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=secbull/135

For IRIX:
Apply the appropriate patch for your system, as listed in SGI Security Advisory 19971201-01-P, ftp://patches.sgi.com/support/free/security/advisories/19971201-01-P1391

For NCR Corporation:
Apply the appropriate patch for your system, as listed in CERT Advisory CA-1996-09, http://www.cert.org/advisories/CA-1996-09.html

For other distributions:
Contact your vendor for upgrade or patch information.
Related URL CVE-1999-0019 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)