Overview
There is a remotely-accessible buffer overflow in SGI IRIX systems running rpc.espd that may allow remote attackers to execute arbitrary code. The Embedded Support Partner daemon (rpc.espd) is enabled by default on all IRIX versions since 6.5.5.
Description
The Embedded Support Partner daemon (rpc.espd) is used system administratosr to manage large numbers of SGI systems running IRIX. It maintains state about the devices attached to IRIX systems on a network. The ESP daemon, rpc.espd, contains a buffer overflow condition that may allow remote attackers to execute arbitrary code with super user privileges on the target server. Internet Security Systems X-Force issued an advisory about this vulnerability on May 9, 2001, which is available at: |
Impact
A remote user may gain root privileges. |
Solution
Please see the following advisory from SGI, 20010501-01-P: |
An excerpt from 20010501-01-P which includes a workaround: |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
Mark Dowd of X-Force, Internet Security Systems, has been publicly credited for discovering this vulnerability.
This document was written by Jeffrey S. Havrilla.
Other Information
CVE IDs: | CVE-2001-0331 |
Severity Metric: | 33.75 |
Date Public: | 2001-05-09 |
Date First Published: | 2001-05-09 |
Date Last Updated: | 2001-05-09 21:31 UTC |
Document Revision: | 6 |