SonicWALL Comprehensive Internet Security
Home
SonicALERT
Search
Search TipsSitemap

Support

 

RPC  All Categories


  Buffer overflow in CDE Calendar Manager Service Daemon (rpc.cmsd)
  rpc.statd in the nfs-utils package in various Linux distributions does not properly cleanse untrusted format strings, which allows remote attackers to gain root privileges.
  snmpXdmi overflow attempt TCP
  snmpXdmi overflow attempt UDP
  CMSD UDP CMSD_CREATE array buffer overflow attempt
  CMSD TCP CMSD_CREATE array buffer overflow attempt
  Buffer overflow in Solaris sadmind allows remote attackers to gain root privileges using a NETMGT_PROC_SERVICE request.
  rpc.lockd in Red Hat Linux 6.1 and 6.2 allows remote attackers to cause a denial of service via a malformed request.
  The NFS service is running.
  The RPC portmapper service is running.
  The bootparam (bootparamd) service is running.
  inetd in AIX 4.1.5 dynamically assigns a port N when starting ttdbserver (ToolTalk server), but also inadvertently listens on port N-1 without passing control to ttdbserver, which allows remote attackers to cause a denial of service via a large number of connections to port N-1, which are not properly closed by inetd.
  Memory leak in ypdb_open in yp_db.c for ypserv before 2.5 in the NIS package 3.9 and earlier allows remote attackers to cause a denial of service (memory consumption) via a large number of requests for a map that does not exist.
  The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote attacker to execute commands.
  ypupdated arbitrary command attempt UDP
  ypupdated arbitrary command attempt TCP
  portmap NFS request UDP
  portmap NFS request TCP
  portmap RQUOTA request UDP
  portmap RQUOTA request TCP
  yppasswd old password overflow attempt UDP
  yppasswd old password overflow attempt TCP
  yppasswd new password overflow attempt UDP
  yppasswd new password overflow attempt TCP
  yppasswd user update UDP
  yppasswd user update TCP
  portmap network-status-monitor request UDP
  portmap network-status-monitor request TCP
  network-status-monitor mon-callback request UDP
  network-status-monitor mon-callback request TCP
  portmap rpc.xfsmd request UDP
  portmap rpc.xfsmd request TCP
  rpc.xfsmd xfs_export attempt UDP
  rpc.xfsmd xfs_export attempt TCP
  portmap espd request UDP
  portmap espd request TCP
  mountd TCP mount request
  mountd UDP mount request
  mountd TCP dump request
  mountd UDP dump request
  mountd TCP unmount request
  mountd UDP unmount request
  mountd TCP unmountall request
  mountd UDP unmountall request
  AMD TCP pid request
  AMD UDP pid request
  AMD TCP version request
  AMD UDP version request
  Buffer overflow in ypserv in Mandrake Linux 7.1 and earlier, and possibly other Linux operating systems, allows an attacker to gain root privileges when ypserv is built without a vsyslog() function.
  Format string vulnerability in ypserv in Mandrake Linux 7.1 and earlier, and possibly other Linux operating systems, allows an attacker to gain root privileges when ypserv is built without a vsyslog() function.
  Buffer overflow in rpc.yppasswdd (yppasswd server) in Solaris 2.6, 7 and 8 allows remote attackers to gain root access via a long username.
  portmap proxy attempt TCP
  portmap proxy attempt UDP
  portmap SET attempt TCP 111
  portmap SET attempt UDP 111
  portmap UNSET attempt TCP 111
  portmap UNSET attempt UDP 111
  portmap rwalld request UDP
  portmap rwalld request TCP
  portmap snmpXdmi request TCP
  portmap snmpXdmi request UDP
  Directory traversal vulnerability in Sun Kodak Color Management System (KCMS) library service daemon (kcms_server) allows remote attackers to read arbitrary files via the KCS_OPEN_PROFILE procedure.
  Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote attackers to execute arbitrary code via certain integer values in length fields, a different vulnerability than CAN-2002-0391.
  A version of rusers is running that exposes valid user information to any entity on the network.
  The SunView (SunTools) selection_svc facility allows remote users to read files.
  Execute commands as root via buffer overflow in Tooltalk database server (rpc.ttdbserverd)
  Buffer overflow in Berkeley automounter daemon (amd) logging facility provided in the Linux am-utils package and others.
  Buffer overflow in Solaris snoop allows remote attackers to gain root privileges via GETQUOTA requests to the rpc.rquotad service.


Relevant Information
IPS Alert Level
Low
Medium
High


Home | Products | Applications | Markets | Support | How to Buy | Channel Partners | Company

Comprehensive Internet Security ® 2003 SonicWALL, Inc. | Privacy Statement