Vulnerability Note VU#682900

SGI IRIX name services daemon (nsd) and modules mishandle AUTH_UNIX gid list

Original Release date: 30 Jul 2003 | Last revised: 30 Jul 2003


A remotely exploitable vulnerability has been discoved in the "nsd" service for SGI IRIX systems. A remote attacker may be able to gain root access to the vulnerable system.


A remotely exploitable heap overflow vulnerability has been discovered in a function for the RPC AUTH_UNIX method of "nsd" service of SGI IRIX 6.5.x systems and potentially earlier versions. A remote attacker may send a specially crafted RPC AUTH_UNIX udp packet to the nsd service. During a copy routine, the user input is not properly validated, and may overwrite memory after the allocated buffer. Details of this vulnerability are outlined in the Last Stage of Delirium advisory. SGI does not support versions prior to 6.5.x and recommend upgrading to 6.5.22 when available to resolve this issue.

According to the SGI Advisory:

It's been reported that the IRIX name services daemon "nsd" can be exploited
in various ways through the AUTH_UNIX gid list. This could result in an
attacker gaining root access.

SGI has investigated the issue and recommends the following steps for
neutralizing the exposure. It is HIGHLY RECOMMENDED that these measures be
implemented on ALL vulnerable SGI systems.

These issues have been corrected in future releases of IRIX.


A remote attacker may be able to gain root access to the vulnerable system.


Install a patch for your version if available, or upgrade to IRIX 6.5.22 when available.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
SGIAffected-30 Jul 2003
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A


  • None


Thanks to SGI Security and Last Stage of Delirium for reporting this vulnerability.

This document was written by Jason A Rafail.

Other Information

  • CVE IDs: CAN-2003-0575
  • Date Public: 29 Jul 2003
  • Date First Published: 30 Jul 2003
  • Date Last Updated: 30 Jul 2003
  • Severity Metric: 14.63
  • Document Revision: 3


If you have feedback, comments, or additional information about this vulnerability, please send us email.