Author: JT Smith
component of the Embedded Support Partner (ESP) subsystem. ESP is
installed and enabled by default on all current SGI IRIX installations.
Impact:
There is a buffer overflow in “rpc.espd” that may allow remote attackers
to execute arbitrary commands on a vulnerable host. A local account is
not required to exploit this vulnerability.”
Category:
- Linux