Linux Multiple statd Packages Remote Format String

Critical Nessus Plugin ID 10544


The remote service is vulnerable to a buffer overflow.


The remote statd service could be brought down with a format string attack - it now needs to be restarted manually.

This means that an attacker may execute arbitrary code thanks to a bug in this daemon.


Upgrade to the latest version of rpc.statd.

See Also

Plugin Details

Severity: Critical

ID: 10544

File Name: statd_format_string.nasl

Version: $Revision: 1.46 $

Type: remote

Family: RPC

Published: 2000/11/10

Modified: 2017/12/26

Dependencies: 12512, 10223, 11936

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

Required KB Items: rpc/portmap, Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2000/07/16

Reference Information

CVE: CVE-2000-0666, CVE-2000-0800

BID: 1480