First published: Mon Jun 07 1999(Updated: )
rpc.statd allows remote attackers to forward RPC calls to the local operating system via the SM_MON and SM_NOTIFY commands, which in turn could be used to remotely exploit other bugs such as in automountd.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sun SunOS | =5.3 | |
Oracle Solaris SPARC | =2.4 | |
Oracle Solaris SPARC | =2.5.1 | |
Oracle Solaris SPARC | =2.5 | |
Sun SunOS | =5.4 | |
Sun SunOS | =5.5.1 | |
Oracle Solaris SPARC | =2.6 | |
Sun SunOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-0493 is considered a high severity vulnerability due to its ability to allow remote attackers to exploit the local operating system via RPC calls.
To fix CVE-1999-0493, it is recommended to apply security patches provided by Sun/Oracle for the affected SunOS and Solaris versions.
CVE-1999-0493 affects various versions of SunOS and Solaris, including 5.3, 5.4, and 2.4 to 2.6.
CVE-1999-0493 impacts the rpc.statd component, which can be manipulated through SM_MON and SM_NOTIFY commands.
CVE-1999-0493 can be leveraged by remote attackers to forward RPC calls, potentially exploiting other vulnerabilities in systems like automountd.