search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Solaris X Window Font Service (XFS) daemon contains buffer overflow in Dispatch() function

Vulnerability Note VU#312313

Original Release Date: 2002-11-25 | Last Revised: 2003-05-30

Overview

A remotely exploitable buffer overflow has been discovered in the Solaris X Window Font Service (XFS) daemon (fs.auto).

Description

ISS X-Force released an Advisory today regarding a remotely exploitable buffer overflow in XFS. According to ISS, XFS is installed and running by default on the following operating systems and architectures:

    • Sun Microsystems Solaris 2.5.1 (Sparc/Intel)
    • Sun Microsystems Solaris 2.6 (Sparc/Intel)
    • Sun Microsystems Solaris 7 (Sparc/Intel)
    • Sun Microsystems Solaris 8 (Sparc/Intel)
    • Sun Microsystems Solaris 9 (Sparc)
    • Sun Microsystems Solaris 9 Update 2 (Intel)
According to the ISS Advisory, the buffer overflow exists in the fs.auto Dispatch() function. Because this function accepts user supplied data, an attacker can send overly large XFS queries to the XFS service and either cause it to crash or execute arbitrary code with the same privileges as the XFS service (typically nobody).

Impact

A remote attacker can execute arbitrary code with the privileges of the fs.auto daemon (typically nobody) or cause a denial of service by crashing the service.

Solution

Apply a vendor patch when it becomes available.

Ingress Filtering - It may be possible to limit the scope of this vulnerability by applying ingress filtering (blocking access to TCP port 7100 at your network perimeter). Note: You should carefully consider the impact of blocking services that you may be using.

    • Disable XFS Service - To disable the XFS Service, comment out the following line in /etc/inetd.conf (remember to restart inetd after making this change)

    fs              stream  tcp     wait nobody /usr/openwin/lib/fs.auto    fs

Vendor Information

312313
 

View all 15 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

ISS X-Force discovered this vulnerability.

This document was written by Ian A Finlay.

Other Information

CVE IDs: CVE-2002-1317
CERT Advisory: CA-2002-34
Severity Metric: 28.13
Date Public: 2002-11-25
Date First Published: 2002-11-25
Date Last Updated: 2003-05-30 17:09 UTC
Document Revision: 13

Sponsored by CISA.