Vulnerability Note VU#682900
SGI IRIX name services daemon (nsd) and modules mishandle AUTH_UNIX gid list
A remotely exploitable vulnerability has been discoved in the "nsd" service for SGI IRIX systems. A remote attacker may be able to gain root access to the vulnerable system.
A remotely exploitable heap overflow vulnerability has been discovered in a function for the RPC AUTH_UNIX method of "nsd" service of SGI IRIX 6.5.x systems and potentially earlier versions. A remote attacker may send a specially crafted RPC AUTH_UNIX udp packet to the nsd service. During a copy routine, the user input is not properly validated, and may overwrite memory after the allocated buffer. Details of this vulnerability are outlined in the Last Stage of Delirium advisory. SGI does not support versions prior to 6.5.x and recommend upgrading to 6.5.22 when available to resolve this issue.
According to the SGI Advisory:
It's been reported that the IRIX name services daemon "nsd" can be exploited
in various ways through the AUTH_UNIX gid list. This could result in an
attacker gaining root access.
SGI has investigated the issue and recommends the following steps for
neutralizing the exposure. It is HIGHLY RECOMMENDED that these measures be
implemented on ALL vulnerable SGI systems.
These issues have been corrected in future releases of IRIX.
A remote attacker may be able to gain root access to the vulnerable system.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|SGI||Affected||-||30 Jul 2003|
CVSS Metrics (Learn More)
Thanks to SGI Security and Last Stage of Delirium for reporting this vulnerability.
This document was written by Jason A Rafail.
- CVE IDs: CAN-2003-0575
- Date Public: 29 Jul 2003
- Date First Published: 30 Jul 2003
- Date Last Updated: 30 Jul 2003
- Severity Metric: 14.63
- Document Revision: 3
If you have feedback, comments, or additional information about this vulnerability, please send us email.