Vulnerability Development mailing list archives
Re: Red Hat 7.1 rpc.statd problem
From: Przemyslaw Frasunek <venglin () freebsd lublin pl>
Date: Wed, 5 Dec 2001 21:29:05 +0100
On Wednesday 05 December 2001 20:26, you wrote:
I would imagine that the rpc.statd attack focused on overflowing a buffer *before* the call to gethostname. All the bug patch needed to do
The above log shows unsuccessful (%x wasn't expanded) rpc.statd exploitation attempt. Attacker tried to exploit format string vulnerability (not a buffer overflow!) present in rpc.statd derived with some Linux distributions (eg. RH 6.2). See http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0666 -- * Fido: 2:480/124 ** WWW: http://www.frasunek.com/ ** NIC-HDL: PMF9-RIPE * * Inet: przemyslaw () frasunek com ** PGP: D48684904685DF43EA93AFA13BE170BF *
Current thread:
- Red Hat 7.1 rpc.statd problem Blue Boar (Dec 05)
- Re: Red Hat 7.1 rpc.statd problem Chris Ess (Dec 05)
- Re: Red Hat 7.1 rpc.statd problem Przemyslaw Frasunek (Dec 05)
- Re: Red Hat 7.1 rpc.statd problem Fyodor (Dec 05)
- Message not available
- Message not available
- Re: Red Hat 7.1 rpc.statd problem Fyodor (Dec 05)
- Re: Red Hat 7.1 rpc.statd problem Blue Boar (Dec 05)
- Re: Red Hat 7.1 rpc.statd problem Fyodor (Dec 05)
- Re: Red Hat 7.1 rpc.statd problem Valdis . Kletnieks (Dec 06)
- Message not available
- Re: Red Hat 7.1 rpc.statd problem Chris Ess (Dec 05)