May 16, 2001

IRIX remote buffer overflow vulnerability

Author: JT Smith

Help Net Security: "ISS X-Force has discovered a buffer overflow in the "rpc.espd"
component of the Embedded Support Partner (ESP) subsystem. ESP is
installed and enabled by default on all current SGI IRIX installations.


There is a buffer overflow in "rpc.espd" that may allow remote attackers
to execute arbitrary commands on a vulnerable host. A local account is
not required to exploit this vulnerability."


  • Linux
Click Here!