T-002: Vulnerability in Host INtegration Server RPC Service


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) T-002: Vulnerability in Host INtegration Server RPC Service
# 1  
Old 11-13-2008
T-002: Vulnerability in Host INtegration Server RPC Service

A remote code execution vulnerability exists in the SNA Remote Procedure Call (RPC) service for Host Integration Server. An attacker could exploit the vulnerability by constructing a specially crafted RPC request. The risk is HIGH. The vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could take complete control of an affected system.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread

3 More Discussions You Might Find Interesting

1. Solaris

RPC bind service in maintenance mode

Hi, I have an issue with RPC bind service and its failing with status 1. any help would be much appreciated. THanks (2 Replies)
Discussion started by: Yakub Humami
2 Replies

2. Solaris

NFS write failed for server.....error 11 (RPC: Server can't decode arguments)

Hello! I have a Linux nfs server (called server100 below) with a export nfs. My problem is that the Solaris client (called client100 below) doesn't seems to like it. In the Solaris syslog I got following messages (and after a while the solaris client behave liked its hanged/to buzy). Also see... (3 Replies)
Discussion started by: sap4ever
3 Replies

3. UNIX for Dummies Questions & Answers

RPC service

Hi All, How can I add RPC service in SCO 5.0.7. I did not find in the sco cd please help me Alice (0 Replies)
Discussion started by: alisevA3
0 Replies
Login or Register to Ask a Question
rpc_xdr(3)						     Library Functions Manual							rpc_xdr(3)

NAME
rpc_xdr, xdr_accepted_reply, xdr_authunix_parms, xdr_callhdr, xdr_callmsg, xdr_opaque_auth, xdr_rejected_reply, xdr_replymsg - XDR library routines for ONC remote procedure calls SYNOPSIS
#include <rpc/xdr.h> xdr_accepted_reply( XDR *xdrs, struct accepted_reply *ar); xdr_authunix_parms( XDR *xdrs, struct authunix_parms *aupp); void xdr_callhdr( XDR *xdrs, struct rpc_msg *chdr); xdr_callmsg( XDR *xdrs, struct rpc_msg *cmsg); xdr_opaque_auth( XDR *xdrs, struct opaque_auth *ap); xdr_rejected_reply( XDR *xdrs, struct rejected_reply *rr); xdr_replymsg( XDR *xdrs, struct rpc_msg *rmsg); DESCRIPTION
These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the server. Upon receipt of the packet, the server calls a dispatch routine to perform the requested service, and then sends back a reply. Finally, the procedure call returns to the client. Unless otherwise indicated, the routines described in this reference page are thread safe (that is, they can be used safely in a multi- threaded environment). Routines that are not thread safe are flagged as such. Encodes RPC reply messages. This routine is useful for users who wish to generate RPC-style messages without using the RPC package. Describes UNIX credentials. This routine is useful for users who wish to generate these credentials without using the RPC authentication package. Describes RPC call header messages. This routine is useful for users who wish to generate RPC-style messages without using the RPC package. Describes RPC call messages. This routine is use- ful for users who wish to generate RPC-style messages without using the RPC package. Describes RPC authentication information messages. This routine is useful for users who wish to generate RPC-style messages without using the RPC package. Describes RPC reply messages. This routine is useful for users who want to generate RPC-style messages without using the RPC package. Describes RPC reply messages. This routine is useful for users who want to generate RPC-style messages without using the RPC package. RELATED INFORMATION
rpc_clnt(3), rpc_misc(3), rpc_svc(3), xdr(3) Remote Procedure Calls: Protocol Specifications - RFC 1050 delim off rpc_xdr(3)