Solaris cachefsd Multiple Vulnerabilities (ESCROWUPGRADE)

Critical Nessus Plugin ID 10951


The remote RPC service is potentially affected by multiple vulnerabilities.


The cachefsd RPC service is running on the remote host. It is, therefore, potentially affected by the following vulnerabilities :

- A heap-based buffer overflow condition exists in the cfsd_calloc() function that allows an unauthenticated, remote attacker to execute arbitrary code via a long directory and cache name. (CVE-2002-0033 / ESCROWUPGRADE)

- A heap-based buffer overflow condition exists in the fscache_setup() function that allows a local attacker to gain root privileges via a long mount argument.

ESCROWUPGRADE is one of multiple Equation Group vulnerabilities and exploits disclosed on 2017/04/08 by a group known as the Shadow Brokers.

Note that Nessus has not attempted to exploit these issues but has instead only detected that the service is running.


Apply the appropriate patch referenced in the vendor's advisory.

Alternatively, disable cachefsd by commenting out cachefsd in /etc/inetd.conf and then killing the process.

See Also

Plugin Details

Severity: Critical

ID: 10951

File Name: cachefsd_overflow.nasl

Version: $Revision: 1.33 $

Type: remote

Published: 2002/05/08

Modified: 2017/05/31

Dependencies: 10223

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C


Base Score: 9.8

Temporal Score: 9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:sun:solaris, cpe:/o:oracle:solaris

Required KB Items: rpc/portmap

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2002/05/24

Vulnerability Publication Date: 2002/04/29

Exploitable With


Reference Information

CVE: CVE-2002-0033, CVE-2002-0084

BID: 4631, 4674

OSVDB: 779, 17477

CERT: 161931, 635811

CERT-CC: CA-2002-11

EDB-ID: 21437