Vulnerability Development mailing list archives

Re: Red Hat 7.1 rpc.statd problem


From: Przemyslaw Frasunek <venglin () freebsd lublin pl>
Date: Wed, 5 Dec 2001 21:29:05 +0100

On Wednesday 05 December 2001 20:26, you wrote:
I would imagine that the rpc.statd attack focused on overflowing a
buffer *before* the call to gethostname.  All the bug patch needed to do

The above log shows unsuccessful (%x wasn't expanded) rpc.statd exploitation 
attempt. Attacker tried to exploit format string vulnerability (not a buffer 
overflow!) present in rpc.statd derived with some Linux distributions (eg. RH 
6.2).

See http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0666

-- 
* Fido: 2:480/124 ** WWW: http://www.frasunek.com/ ** NIC-HDL: PMF9-RIPE *
* Inet: przemyslaw () frasunek com ** PGP: D48684904685DF43EA93AFA13BE170BF *


Current thread: