Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA180] DSA-180-1 nis

Vulnerability Assessment Details

[DSA180] DSA-180-1 nis

Vulnerability Assessment Summary
DSA-180-1 nis

Detailed Explanation for this Vulnerability Assessment

Thorsten Kukuck discovered a problem in the ypserv program which is
part of the Network Information Services (NIS). A memory leak in all
versions of ypserv prior to 2.5 is remotely exploitable. When a
malicious user could request a non-existing map the server will leak
parts of an old domainname and mapname.
This problem has been fixed in version 3.9-6.1 for the current stable
distribution (woody), in version 3.8-2.1 for the old stable
distribution (potato) and in version 3.9-6.2 for the unstable
distribution (sid).
We recommend that you upgrade your nis package.

Solution :
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

P4Dual- 915GL Micro ATX motherboard+CPU 3,8Ghz
P4Dual- 915GL  Micro ATX motherboard+CPU 3,8Ghz pictureIBM Personal Communications 3270 V3.1 Vintage 3.5" Disks *New Sealed*
IBM Personal Communications 3270 V3.1 Vintage 3.5Apple MacBook Air Motherboard 13" Mid-2012 i7-3667U 2.0GHz 21PJ7MB00C0 8GB A1466
Apple MacBook Air Motherboard 13MacBook Pro 15" Retina Right I/O Board, Late 2013 - NM19 11A NYKS 94V-0
MacBook Pro 15


No Discussions have been posted on this vulnerability.