{"vuid":"VU#172583","idnumber":"172583","name":"Common Desktop Environment (CDE) Subprocess Control Service dtspcd contains buffer overflow","keywords":["Common Desktop Environment","CDE","Subprocess Control Service","dtspcd","negotiation","libdtsvc.so.1","SSRT0782U"],"overview":"A remotely exploitable buffer overflow exists in the Common Desktop Environment (CDE) Subprocess Control Service (dtspcd). An attacker who successfully exploits this vulnerability can execute arbitrary code as root.","clean_desc":"Internet Security Systems (ISS) X-Force has reported a remotely exploitable buffer overflow in the Common Desktop Environment (CDE) Subprocess Control Service (dtspcd). CDE is an integrated graphical user interface that runs on Unix and Linux operating systems. dtspcd is a network daemon that accepts requests from clients to execute commands and launch applications remotely. On systems running CDE, dtspcd is spawned by the Internet services daemon (typically inetd or xinetd) in response to a CDE client request. dtspcd is typically configured to run on port 6112/tcp with root privileges. dtspcd makes a function call to a shared library, libDTSvc.so.1, that contains a buffer overflow condition in the client connection routine. The buffer overflow can be exploited by a specially crafted CDE client request. Although the buffer overflow occurs in a shared library, the CERT/CC is not aware of any other CDE applications that use the vulnerable function.","impact":"A successful attacker can execute arbitrary code remotely with root privileges.","resolution":"Apply Patch\nApply the appropriate vendor supplied patch as described in the vendor section below.","workarounds":"Disable Vulnerable Service Until a patch can be applied, you may wish to consider disabling dtspcd. Typically, this may be achieved by commenting out the approprate entry in /etc/inetd.conf. As a general practice, CERT/CC recommends disabling any services that are not explicitly required. It is important to carefully consider the consequences of disabling dtspcd in your environment. /etc/inetd.conf\ndtspc stream tcp nowait root /usr/dt/bin/dtspcd /usr/dt/bin/dtspcd\nBlock or Restrict Access Monitor or block external access to 6112/tcp. It may be possible to use TCP Wrapper or a similar technology to provide improved access control and logging. Additionally, an application-level firewall may be able to filter requests made to dtspcd.","sysaffected":"","thanks":"This vulnerability was reported to the CERT Coordination Center by Internet Security Systems (ISS) \nX-Force","author":"This document was written by Art Manion.","public":["http://www.cert.org/advisories/CA-2001-31.html","http://xforce.iss.net/alerts/advise101.php","http://www.securityfocus.com/bid/3517"],"cveids":["CVE-2001-0803"],"certadvisory":"CA-2001-31","uscerttechnicalalert":null,"datecreated":"2001-10-25T15:19:05Z","publicdate":"2001-11-07T00:00:00Z","datefirstpublished":"2001-11-12T21:12:02Z","dateupdated":"2003-08-11T19:00:34Z","revision":45,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"8","cam_population":"18","cam_impact":"20","cam_easeofexploitation":"7","cam_attackeraccessrequired":"15","cam_scorecurrent":"16.30125","cam_scorecurrentwidelyknown":"19.845","cam_scorecurrentwidelyknownexploited":"34.02","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":16.30125,"vulnote":null}