Author: JT Smith
Help Net Security: “ISS X-Force has discovered a buffer overflow in the “rpc.espd”
component of the Embedded Support Partner (ESP) subsystem. ESP is
installed and enabled by default on all current SGI IRIX installations.
component of the Embedded Support Partner (ESP) subsystem. ESP is
installed and enabled by default on all current SGI IRIX installations.
Impact:
There is a buffer overflow in “rpc.espd” that may allow remote attackers
to execute arbitrary commands on a vulnerable host. A local account is
not required to exploit this vulnerability.”
Category:
- Linux