📄 1909.txt
字号:
Rule:Sid:1909--Summary:This event is generated when an attempt is made to exploit a bufferoverflow associated with the Remote Procedure Call (RPC) CalendarManager Service daemon, cmsd.--Impact:Remote root access. The attack may allow execution of arbitrary commandswith the privileges of root.--Detailed Information:The cmsd RPC service implements the Calendar Manager Service daemon thatis often distributed with the Common Desktop Environment (CDE) and OpenWindows. The Calendar Manager daemon provides appointment and schedulingfunctions for CDE. A buffer overflow exists in the rtable_insert()function because of improper bounds checking, allowing the execution ofarbitrary commands with the privileges of root. One possible exploitvector is by inserting appointments into the Calendar Manager database. --Affected Systems: SCO Open UNIX 8.0 SCO UnixWare 7.1.1 HP-UX 10.20, 10.24, 10.30, 11.0 Sun Solaris 2.3, 2.4, 2.5, 2.5.1, 2.6, 7.0 Sun SunOS 4.1.3, 4.1.4--Attack Scenarios:The attacker can use the exploit code to overflow the buffer allowingexecution of arbitrary commands with the privileges of root.--Ease of Attack:Simple. Exploit code is freely available.--False Positives:None Known.--False Negatives:None Known.--Corrective Action:Limit remote access to RPC services.Filter RPC ports at the firewall to ensure access is denied toRPC-enabled machines. Disable unneeded RPC services.--Contributors:Sourcefire Research TeamBrian Caswell <bmc@sourcefire.com>Judy Novak <judy.novak@sourcefire.com>--Additional References:--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -