Linux Multiple statd Packages Remote Format String

This script is Copyright (C) 2000-2014 Tenable Network Security, Inc.


Synopsis :

The remote service is vulnerable to a buffer overflow.

Description :

The remote statd service could be brought down with a format string
attack - it now needs to be restarted manually.

This means that an attacker may execute arbitrary code thanks to a bug
in this daemon.

See also :

http://archives.neohapsis.com/archives/bugtraq/2000-07/0206.html

Solution :

Upgrade to the latest version of rpc.statd.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.3
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: RPC

Nessus Plugin ID: 10544 ()

Bugtraq ID: 1480

CVE ID: CVE-2000-0666
CVE-2000-0800