{"vuid":"VU#682900","idnumber":"682900","name":"SGI IRIX name services daemon (nsd) and modules mishandle AUTH_UNIX gid list","keywords":["SGI","IRIX","name services daemon","nsd","modules","AUTH_UNIX","gid list"],"overview":"A remotely exploitable vulnerability has been discoved in the \"nsd\" service for SGI IRIX systems. A remote attacker may be able to gain root access to the vulnerable system.","clean_desc":"A remotely exploitable heap overflow vulnerability has been discovered in a function for the RPC AUTH_UNIX method of \"nsd\" service of SGI IRIX 6.5.x systems and potentially earlier versions. A remote attacker may send a specially crafted RPC AUTH_UNIX udp packet to the nsd service. During a copy routine, the user input is not properly validated, and may overwrite memory after the allocated buffer. Details of this vulnerability are outlined in the Last Stage of Delirium advisory. SGI does not support versions prior to 6.5.x and recommend upgrading to 6.5.22 when available to resolve this issue. According to the SGI Advisory: It's been reported that the IRIX name services daemon \"nsd\" can be exploited\nin various ways through the AUTH_UNIX gid list. This could result in an\nattacker gaining root access. SGI has investigated the issue and recommends the following steps for\nneutralizing the exposure. It is HIGHLY RECOMMENDED that these measures be\nimplemented on ALL vulnerable SGI systems. These issues have been corrected in future releases of IRIX.","impact":"A remote attacker may be able to gain root access to the vulnerable system.","resolution":"Install a patch for your version if available, or upgrade to IRIX 6.5.22 when available.","workarounds":"","sysaffected":"","thanks":"Thanks to SGI Security and Last Stage of Delirium  for reporting this vulnerability.","author":"This document was written by Jason A Rafail.","public":[],"cveids":["CVE-2003-0575"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2003-07-30T17:22:12Z","publicdate":"2003-07-29T00:00:00Z","datefirstpublished":"2003-07-30T19:15:07Z","dateupdated":"2003-07-30T19:15:18Z","revision":6,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"16","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"10","cam_impact":"20","cam_easeofexploitation":"10","cam_attackeraccessrequired":"15","cam_scorecurrent":"14.625","cam_scorecurrentwidelyknown":"16.875","cam_scorecurrentwidelyknownexploited":"28.125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":14.625,"vulnote":null}