Provided by Aanval (Snort & Syslog Intrusion Detection and Correlation Engine) www.aanval.com
--
GEN:SID | 1:2024 |
Message | RPC RQUOTA getquota overflow attempt TCP |
Summary | A vulnerability exists in Solaris snoop such that a remote attacker could gain superuser access when used with the RPC service rquotad |
Impact | Remote super user access leading to a compromise of the target machine along with any network resources that machine is connected to. |
Detailed Information | Certain versions of the Solaris operating system use a program to monitor network traffic called Snoop. This program contains a flaw such that under certain conditions a buffer overflow can be caused by a remote attacker. One such condition occurs when snoop tries to decode GETQUOTA requests to the RPC service rquotad. This daemon sends information regarding disk quotas on multi-user systems using remotely mounted shares via NFS. A specially crafted long request will trigger this overflow resulting in root access on the victim host. |
Affected Systems | Sun Solaris 2.4 _x86 Sun Solaris 2.4 Sun Solaris 2.5 _x86 Sun Solaris 2.5 Sun Solaris 2.5.1 _x86 Sun Solaris 2.5.1 _ppc Sun Solaris 2.5.1 Sun Solaris 2.6 _x86 Sun Solaris 2.6 Sun Solaris 7.0 _x86 Sun Solaris 7.0 |
Attack Scenarios | An attacker can send a specially crafted long request to snoop via the rpc.rquotad service such that it will generate a buffer overflow. |
Ease of Attack | Simple although a requirement is that snoop should be running at the time of attack. |
Corrective Action | Patches are available for all operating systems and platforms listed as affected from Sun. These patches should be applied as soon as possible. See the Vendor site http://sunsolve.sun.com for details. |
Additional References | Bugtraq: http://www.securityfocus.com/bid/864 CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0974 |
Rule References | bugtraq: 864 cve: 1999-0974 |
--
DID:304625
--
http://www.aanval.com/