Vulnerability Name:

CVE-1999-0019 (CCN-109)

Assigned:1996-04-01
Published:1996-04-01
Updated:2008-09-09
Summary:Delete or create a file via rpc.statd, due to invalid information.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:File Manipulation
References:Source: CCN
Type: AusCERT Advisory AA-97.29
statd Buffer Overrun Vulnerability

Source: CCN
Type: SGI Security Advisory 19971201-01-P1391
Buffer Overrun Vulnerability in statd(1M) Program

Source: MITRE
Type: CNA
CVE-1999-0019

Source: SUN
Type: UNKNOWN
00135

Source: CCN
Type: Sun Microsystems, Inc. Security Bulletin #00135
Vulnerability with the statd program

Source: CCN
Type: Hewlett-Packard Company Security Bulletin HPSBUX9607-032
Security Vulnerability in rpc.pcnfsd & rpc.statd

Source: CCN
Type: CERT Advisory CA-1996-09
Vulnerability in rpc.statd

Source: CCN
Type: CIAC Information Bulletin CIAC-07
Notice of Vulnerability Involving RCP and RDIST

Source: CCN
Type: CIAC Information Bulletin CIAC-12
Notice of Availability of SUN Patch For RCP and RDIST

Source: CCN
Type: OSVDB ID: 11734
Multiple Unix Vendor rpc.statd Arbitrary File Creation/Deletion

Source: CCN
Type: BID-6831
Multiple Vendor rpc.statd Arbitrary File Creation / Deletion Vulnerability

Source: XF
Type: UNKNOWN
rpc-stat(109)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:data_general:dg_ux:4.11:*:*:*:*:*:*:*
  • OR cpe:/a:ncr:mp-ras:2.03:*:*:*:*:*:*:*
  • OR cpe:/a:ncr:mp-ras:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.1:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:ibm:aix:3.2:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:aix:4.1:*:*:*:*:*:*:*
  • OR cpe:/o:nighthawk:cx_ux:*:*:*:*:*:*:*:*
  • OR cpe:/o:nighthawk:powerux:*:*:*:*:*:*:*:*
  • OR cpe:/o:sco:open_desktop:2:*:*:*:*:*:*:*
  • OR cpe:/o:sco:open_desktop:3:*:*:*:*:*:*:*
  • OR cpe:/o:sco:openserver:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:sco:openserver:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:sco:unixware:2:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:4.1.3:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:4.1.4:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.3:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.4:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.4:*:x86:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.5:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.5:*:x86:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:hp:hp-ux:10.00:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:10.09:*:*:*:*:*:*:*
  • OR cpe:/o:nec:ews-ux_v:*:*:*:*:*:*:*:*
  • OR cpe:/o:nec:up-ux_v:*:*:*:*:*:*:*:*
  • OR cpe:/o:nec:asl_ux_4800:*:*:*:*:*:*:*:*
  • OR cpe:/o:next:nextstep:*:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:10.01:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:10.10:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:10.20:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:10.30:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:10.16:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:9.01:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:10.24:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:10.26:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:10.02:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:10.03:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:10.08:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:10.34:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:9.00:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:9.03:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:9.04:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:9.05:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:9.06:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:9.07:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:9.08:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:9.09:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:9.10:*:*:*:*:*:*:*
  • AND
  • cpe:/o:ibm:aix:*:*:*:*:*:*:*:*
  • OR cpe:/o:windriver:bsdos:*:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:*:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:*:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:*:*:*:*:*:*:*:*
  • OR cpe:/o:sun:solaris:*:*:*:*:*:*:*:*
  • OR cpe:/a:data_general:dg_ux:*:*:*:*:*:*:*:*
  • OR cpe:/o:sco:unix:*:*:*:*:*:*:*:*
  • OR cpe:/a:ncr:mp-ras:2.03:*:*:*:*:*:*:*
  • OR cpe:/o:compaq:tru64:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    data_general dg ux 4.11
    ncr mp-ras 2.03
    ncr mp-ras 3.0
    sgi irix 6.1
    ibm aix 3.2
    ibm aix 4.1
    nighthawk cx ux *
    nighthawk powerux *
    sco open desktop 2
    sco open desktop 3
    sco openserver 3.0
    sco openserver 5.0
    sco unixware 2
    sun sunos 4.1.3
    sun sunos 4.1.4
    sun sunos 5.3
    sun sunos 5.4
    sun sunos 5.4
    sun sunos 5.5
    sun sunos 5.5
    hp hp-ux 10.00
    hp hp-ux 10.09
    nec ews-ux v *
    nec up-ux v *
    nec asl ux 4800 *
    next nextstep *
    hp hp-ux 10.01
    hp hp-ux 10.10
    hp hp-ux 10.20
    hp hp-ux 10.30
    hp hp-ux 10.16
    hp hp-ux 9.01
    hp hp-ux 10.24
    hp hp-ux 10.26
    hp hp-ux 10.02
    hp hp-ux 10.03
    hp hp-ux 10.08
    hp hp-ux 10.34
    hp hp-ux 9.00
    hp hp-ux 9.03
    hp hp-ux 9.04
    hp hp-ux 9.05
    hp hp-ux 9.06
    hp hp-ux 9.07
    hp hp-ux 9.08
    hp hp-ux 9.09
    hp hp-ux 9.10
    ibm aix *
    windriver bsdos *
    hp hp-ux *
    sgi irix *
    linux linux kernel *
    sun solaris *
    data_general dg ux *
    sco unix *
    ncr mp-ras 2.03
    compaq tru64 *