Rapid7 Vulnerability & Exploit Database

Solaris rpc.statd rpc Call Relaying Vulnerability

Back to Search

Solaris rpc.statd rpc Call Relaying Vulnerability

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
06/07/1999
Created
07/25/2018
Added
11/01/2004
Modified
12/04/2013

Description

The rpc service rpc.statd, shipped with all major versions of Sun's Solaris operating system, is the status monitoring service for NFS file locking. The vulnerability lies in rpc.statd's ability to relay rpc calls to other rpc services without being validated by the access controls of the other rpc services. This can give the attacker the ability to redirect malicious rpc commands through rpc.statd (which runs as root) to services they may not normally have access to.

Solution(s)

  • nfs-statd-0004

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;