Solaris cachefsd Multiple Vulnerabilities (ESCROWUPGRADE)
Critical Nessus Plugin ID 10951
SynopsisThe remote RPC service is potentially affected by multiple vulnerabilities.
DescriptionThe cachefsd RPC service is running on the remote host. It is, therefore, potentially affected by the following vulnerabilities :
- A heap-based buffer overflow condition exists in the cfsd_calloc() function that allows an unauthenticated, remote attacker to execute arbitrary code via a long directory and cache name. (CVE-2002-0033 / ESCROWUPGRADE)
- A heap-based buffer overflow condition exists in the fscache_setup() function that allows a local attacker to gain root privileges via a long mount argument.
ESCROWUPGRADE is one of multiple Equation Group vulnerabilities and exploits disclosed on 2017/04/08 by a group known as the Shadow Brokers.
Note that Nessus has not attempted to exploit these issues but has instead only detected that the service is running.
SolutionApply the appropriate patch referenced in the vendor's advisory.
Alternatively, disable cachefsd by commenting out cachefsd in /etc/inetd.conf and then killing the process.