TUCoPS :: SGI :: espd~1.htm

IRIX 6.5.5, 6.5.8 Embedded Support Partner Infrastructure Sender (rpc.espd) Buffer Overflow
Vulnerability

    Embedded Support Partner Infrastructure Sender (rpc.espd)

Affected

    IRIX 6.5.5, 6.5.8

Description

    Following is based  on a ISS  Security Advisory.   ISS X-Force has
    discovered  a  buffer  overflow  in  the rpc.espd component of the
    Embedded Support Partner  (ESP) subsystem.   ESP is installed  and
    enabled by default on all current SGI IRIX installations.

    A local account is not required to exploit this vulnerability.

    ESP was developed  by SGI to  address the concerns  of many system
    administrators who needed to manage large-scale SGI  environments.
    ESP allows administrators  better access to  information regarding
    the state  of all  SGI devices  on a  network.   It integrates and
    correlates  system  configuration  management,  event  management,
    resource management, reporting, statistics generation and analysis
    as well as many other features.

    ESP was first introduced in  IRIX version 6.5.5.  The  ESP daemon,
    rpc.espd,  contains  a  buffer  overflow  condition that may allow
    remote attackers  to execute  arbitrary commands  with super  user
    privileges on the target server.

    This vulnerability was discovered  and researched by Mark  Dowd of
    ISS X-Force.

Solution

    SGI recommends immediately disabling rpc.espd to prevent  exposure
    before patches can be applied.  To disable rpc.espd:

        # /bin/chmod -x /usr/etc/rpc.espd
        # /etc/killall -HUP inetd

    SGI  has  made  security  patch  4123  available  to  address this
    vulnerability.

    This issue has been corrected in ESP 2.0 for IRIX 6.5.9 and above.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH