OpenServer 5.0.5/5.0.6 / HP-UX 10/11 / Solaris 2.6/7.0/8 - rpc.yppasswdd Buffer Overrun
Author: metaray
type: remote
platform: unix
port:
date_added: 2001-05-10
date_updated: 2012-09-02
verified: 1
codes: CVE-2001-0779;OSVDB-567
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/2763/info
The rpc.yppasswdd server is used to handle password change requests from yppasswd and modify the NIS password file.
A buffer overrun vulnerability has been discovered in the rpc.yppasswdd utility distributed by multiple vendors. The problem occurs due to insufficient bounds checking before copying remotely-supplied user information into a static memory buffer. As a result, a malicious user may be capable of exploiting this issue to overwrite sensitive locations in memory and thus execute arbitrary code with superuser privileges.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20879.tar.gz