search menu icon-carat-right cmu-wordmark

CERT Coordination Center

SGI IRIX name services daemon (nsd) and modules mishandle AUTH_UNIX gid list

Vulnerability Note VU#682900

Original Release Date: 2003-07-30 | Last Revised: 2003-07-30

Overview

A remotely exploitable vulnerability has been discoved in the "nsd" service for SGI IRIX systems. A remote attacker may be able to gain root access to the vulnerable system.

Description

A remotely exploitable heap overflow vulnerability has been discovered in a function for the RPC AUTH_UNIX method of "nsd" service of SGI IRIX 6.5.x systems and potentially earlier versions. A remote attacker may send a specially crafted RPC AUTH_UNIX udp packet to the nsd service. During a copy routine, the user input is not properly validated, and may overwrite memory after the allocated buffer. Details of this vulnerability are outlined in the Last Stage of Delirium advisory. SGI does not support versions prior to 6.5.x and recommend upgrading to 6.5.22 when available to resolve this issue.

According to the SGI Advisory:

It's been reported that the IRIX name services daemon "nsd" can be exploited
in various ways through the AUTH_UNIX gid list. This could result in an
attacker gaining root access.

SGI has investigated the issue and recommends the following steps for
neutralizing the exposure. It is HIGHLY RECOMMENDED that these measures be
implemented on ALL vulnerable SGI systems.

These issues have been corrected in future releases of IRIX.

Impact

A remote attacker may be able to gain root access to the vulnerable system.

Solution

Install a patch for your version if available, or upgrade to IRIX 6.5.22 when available.

Vendor Information

682900
 

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to SGI Security and Last Stage of Delirium for reporting this vulnerability.

This document was written by Jason A Rafail.

Other Information

CVE IDs: CVE-2003-0575
Severity Metric: 14.63
Date Public: 2003-07-29
Date First Published: 2003-07-30
Date Last Updated: 2003-07-30 19:15 UTC
Document Revision: 6

Sponsored by CISA.