Linux Multiple statd Packages Remote Format String

critical Nessus Plugin ID 10544

Synopsis

The remote service is vulnerable to a buffer overflow.

Description

The remote statd service could be brought down with a format string attack - it now needs to be restarted manually.

This means that an attacker may execute arbitrary code thanks to a bug in this daemon.

Solution

Upgrade to the latest version of rpc.statd.

See Also

https://seclists.org/bugtraq/2000/Jul/206

Plugin Details

Severity: Critical

ID: 10544

File Name: statd_format_string.nasl

Version: 1.48

Type: remote

Family: RPC

Published: 11/10/2000

Updated: 11/15/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: Settings/ParanoidReport, rpc/portmap

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 7/16/2000

Reference Information

CVE: CVE-2000-0666, CVE-2000-0800

BID: 1480