File: 2082.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (78 lines) | stat: -rw-r--r-- 1,325 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
Rule:

--
Sid:
2082

--
Summary:
number for the rpc service xfsmd

--
Impact:
Intelligence gathering

--
Detailed Information:
This may be an attacker probing for vulnerable versions of rpc services.
In this case, the rpc service xfsmd.

It is possible for an attacker to supply a meta character followed by
any commands or code of his choosing to the xfsmd daemon.

Due to a programming error, the service does not correctly check for the
characters and they are not stripped from the request.

The xfsmd daemon is not installed by default on IRIX systems but it is 
part of an optional package.

--
Affected Systems:
	IRIX 6.2
	IRIX 6.3
	IRIX 6.4
	IRIX 6.5.x

--
Attack Scenarios:
Exploits are widely available.

--
Ease of Attack:
Simple

--
False Positives:
None Known

--
False Negatives:
None Known

--
Corrective Action:
Patches are NOT available for this issue.

Disable and remove the xfsmd daemon.

Uprade to the latest non affected version of the operating system

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:

Bugtraq:
http://www.securityfocus.com/bid/5075

CVE:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0359

SGI IRIX:
ftp://patches.sgi.com/support/free/security/advisories/20020606-01-I

--