Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> RPC >> dmisd service


Vulnerability Assessment Details

dmisd service

Vulnerability Assessment Summary
Checks the presence of a RPC service

Detailed Explanation for this Vulnerability Assessment

The dmisd RPC service is running.

This service uses the function xdr_array() of the RPC library.
It turns out that some older versions of the RPC library
are vulnerable to an integer overflow in this function,
which could permit a possible hacker to gain root rights on
this host.

*** No security hole regarding this program has been tested, so
*** this might be a false positive.

Solution : We suggest that you disable this service.
See also : http://www.cert.org/advisories/CA-2002-25.html
Network Security Threat Level: High

Networks Security ID: 5356

Vulnerability Assessment Copyright: This script is Copyright (C) 2003 Renaud Deraison

Cables, Connectors

16gb (2x8GB) PC2-5300P 2Rx4 DDR2 Server Memory KTD-PE6950/16G FOR AMD CPU ONLY
$46.14
16gb (2x8GB) PC2-5300P 2Rx4 DDR2 Server Memory KTD-PE6950/16G  FOR AMD CPU ONLY picture1pcs USB 2.0 unique iron man model 8G Enough Memory Stick Flash pen Drive T11A1
$0.01
1pcs USB 2.0 unique iron man model 8G Enough Memory Stick Flash pen Drive  T11A1 pictureTimetec Hynix IC Apple 16GB Kit 2x8GB DDR3 PC3-8500 1066MHz memory upgrade for
$109.74
Timetec Hynix IC Apple 16GB Kit 2x8GB DDR3 PC3-8500 1066MHz memory upgrade for pictureHOT SALE Mini Memory Card Reader USB 2.0 Adapter For Micro SD CARD SDHC SDXC TF
$0.59
HOT SALE Mini Memory Card Reader USB 2.0 Adapter For Micro SD CARD SDHC SDXC TF picture


Discussions

No Discussions have been posted on this vulnerability.