{"vuid":"VU#855635","idnumber":"855635","name":"Sun Solaris lockd(1M) daemon vulnerable to DoS","keywords":["Sun","Solaris 9","lockd","nfsd","DoS","denial of service","nmap scan"],"overview":"A remotely exploitable denial-of-service vulnerability exists in the Solaris lockd(1M) daemon. Exploitation of this vulnerability may kill the lockd process.","clean_desc":"Sun Microsystems describes the lockd(1M) daemon as follows: The lockd utility is part of the NFS lock manager, which supports record locking operations on NFS files. The lock manager provides two functions: it forwards fcntl(2) locking requests for NFS mounted file systems to the lock manager on the NFS server\nit generates local file locking operations in response to requests forwarded from lock managers running on NFS client machines\nA vulnerability in the lockd(1M) daemon may allow a remote attacker to terminate the lockd(1M) process. A tool to exploit this vulnerability is publicly available.","impact":"A remote attacker can terminate the lockd(1M) daemon.","resolution":"Apply a patch. For more information about the patches, please see Sun Alert Notification 47815.","workarounds":"","sysaffected":"","thanks":"The CERT/CC thanks Phil Moses of \nUC San Diego\n for reporting this vulnerability to us.","author":"This document was written by Ian A Finlay.","public":["http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/47815","http://docs.sun.com/db/doc/805-8067/6j7j82mod?a=view","http://www.iss.net/security_center/static/10394.php","http://online.securityfocus.com/bid/5986"],"cveids":["CVE-2002-1228"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-08-20T15:40:26Z","publicdate":"2003-01-02T00:00:00Z","datefirstpublished":"2003-02-05T20:58:51Z","dateupdated":"2003-02-06T18:00:05Z","revision":11,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"17","cam_population":"15","cam_impact":"3","cam_easeofexploitation":"20","cam_attackeraccessrequired":"15","cam_scorecurrent":"8.1","cam_scorecurrentwidelyknown":"9.365625","cam_scorecurrentwidelyknownexploited":"14.428125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":8.1,"vulnote":null}