search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Common Desktop Environment (CDE) Subprocess Control Service dtspcd contains buffer overflow

Vulnerability Note VU#172583

Original Release Date: 2001-11-12 | Last Revised: 2003-08-11

Overview

A remotely exploitable buffer overflow exists in the Common Desktop Environment (CDE) Subprocess Control Service (dtspcd). An attacker who successfully exploits this vulnerability can execute arbitrary code as root.

Description

Internet Security Systems (ISS) X-Force has reported a remotely exploitable buffer overflow in the Common Desktop Environment (CDE) Subprocess Control Service (dtspcd). CDE is an integrated graphical user interface that runs on Unix and Linux operating systems. dtspcd is a network daemon that accepts requests from clients to execute commands and launch applications remotely. On systems running CDE, dtspcd is spawned by the Internet services daemon (typically inetd or xinetd) in response to a CDE client request. dtspcd is typically configured to run on port 6112/tcp with root privileges. dtspcd makes a function call to a shared library, libDTSvc.so.1, that contains a buffer overflow condition in the client connection routine. The buffer overflow can be exploited by a specially crafted CDE client request. Although the buffer overflow occurs in a shared library, the CERT/CC is not aware of any other CDE applications that use the vulnerable function.

Impact

A successful attacker can execute arbitrary code remotely with root privileges.

Solution

Apply Patch

Apply the appropriate vendor supplied patch as described in the vendor section below.


Disable Vulnerable Service

Until a patch can be applied, you may wish to consider disabling dtspcd. Typically, this may be achieved by commenting out the approprate entry in /etc/inetd.conf. As a general practice, CERT/CC recommends disabling any services that are not explicitly required. It is important to carefully consider the consequences of disabling dtspcd in your environment.

/etc/inetd.conf
dtspc stream tcp nowait root /usr/dt/bin/dtspcd /usr/dt/bin/dtspcd
Block or Restrict Access

Monitor or block external access to 6112/tcp. It may be possible to use TCP Wrapper or a similar technology to provide improved access control and logging. Additionally, an application-level firewall may be able to filter requests made to dtspcd.

Vendor Information

172583
 

View all 12 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported to the CERT Coordination Center by Internet Security Systems (ISS) X-Force.

This document was written by Art Manion.

Other Information

CVE IDs: CVE-2001-0803
CERT Advisory: CA-2001-31
Severity Metric: 16.30
Date Public: 2001-11-07
Date First Published: 2001-11-12
Date Last Updated: 2003-08-11 19:00 UTC
Document Revision: 45

Sponsored by CISA.