📄 2092.txt
字号:
Rule:--Sid:2092--Summary:vulnerability in xdrmem_getbytes used by XDR in RPC portmap services.--Impact:System compromise, denial of service, execution of arbitrary code, information disclosure.--Detailed Information:A vulnerability exists in various implementations of external data representation (XDR) libraries. An integer overflow in a component (xdrmem_getbytes) used by XDR can lead to a buffer overflow.The XDR libraries are widely used by multiple vendors to provide a framework for data transmission across networks. This is most commonly used in RPC implementations.A specially crafted rpc request can lead to remote system compromise andsuper user access to the target host. Additionally, a denial of service and execution of arbitrary code with the privilege of the super user is also possible.--Affected Systems:Multiple vendors including all those using: Sun Microsystems Network Services Library (libnsl) GNU C library with sunrpc (glibc) BSD-derived libraries with XDR/RPC routines (libc)--Attack Scenarios:The attacker needs to send a specially crafted rpc request to the targethost.--Ease of Attack:Simple--False Positives:None Known--False Negatives:None Known--Corrective Action:Apply the appropriate vendor supplied patches.Upgrade the vendor libraries to the latest non-affected versions. Any statically linked binaries and applications must be recompiled and restarted after the upgrade.Disallow all RPC requests from external sources and use a firewall to block access to RPC ports from outside the LAN.--Contributors:Sourcefire Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References:Bugtraq:http://www.securityfocus.com/bid/7123CVE:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0028CERT:http://www.cert.org/advisories/CA-2003-10.htmlhttp://www.kb.cert.org/vuls/id/516825http://www.kb.cert.org/vuls/id/192995--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -