Vulnerability Note VU#28027

Distributed GL Daemon (DGLD) allows attackers to identify IRIX systems

Original Release date: 27 Oct 2000 | Last revised: 05 Mar 2002

Overview

Attackers are using the presence of the dgld service to identify SGI IRIX systems.

Description

The CERT/CC has received multiple reports of an apparent vulnerability in the Distributed GL Daemon on SGI IRIX systems. Upon further investigation, it is our belief that no vulnerability exists in dgld. However, this activity is still significant in that it allows attackers to identify systems running IRIX, which can subsequently be attacked via vulnerabilities such as the ObjectServer (VU#16642) or df (VU#20851) vulnerabilities.

Impact

Remote users scanning for a dgld service running port on port 5232 may be able to identify victim sites running IRIX.

Solution

The CERT/CC does not believe that there is a vulnerability in dgld. However, sites that do not use dgld should disable it on IRIX hosts to avoid exposing information about the nature of such hosts.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
SGINot Affected11 May 200022 Dec 2000
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

The CERT/CC thanks SGI for their assistance in researching this issue.

This document was written by Jeffrey P Lanza.

Other Information

  • CVE IDs: CAN-2000-0893
  • Date Public: 27 Oct 2000
  • Date First Published: 27 Oct 2000
  • Date Last Updated: 05 Mar 2002
  • Severity Metric: 0.14
  • Document Revision: 24

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.