IRIX remote buffer overflow vulnerability

8

Author: JT Smith

Help Net Security: “ISS X-Force has discovered a buffer overflow in the “rpc.espd”
component of the Embedded Support Partner (ESP) subsystem. ESP is
installed and enabled by default on all current SGI IRIX installations.

Impact:

There is a buffer overflow in “rpc.espd” that may allow remote attackers
to execute arbitrary commands on a vulnerable host. A local account is
not required to exploit this vulnerability.”

Category:

  • Linux