[4642] in bugtraq

home help back first fref pref prev next nref lref last post

Re: [SNI-14]: Solaris rpcbind vulnerability

daemon@ATHENA.MIT.EDU (James W. Abendschan)
Fri Jun 6 11:13:47 1997

Date: 	Fri, 6 Jun 1997 02:54:35 -0700
Reply-To: "James W. Abendschan" <jwa@JAMMED.COM>
From: "James W. Abendschan" <jwa@JAMMED.COM>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <199706060810.CAA00794@cvs.openbsd.org>

On Thu, 5 Jun 1997, I wrote:
> When I saw this a few weeks ago on SNI's web page (it wasn't published
> as an advisory, it was published as one of the checks their Ballista tool
> performs) I was intrigued, so I sat down and spent some time trying
> to exploit this.
>
> By modifying rpcinfo.c to connect to port 32771 and changing the
> PMAPPROC_DUMP stuff to work over UDP instead of TCP (clntudp_create),
> you can get nicely functional "over-the-packet-filter" rpc dump.

This client is available at

        http://www.jammed.com/~jwa/Security/h_rpcinfo.tar.gz

James

--
James W. Abendschan                                              jwa@jammed.com
JAMMED Systems, Inc.                                      http://www.jammed.com
       "Turing," she said.  "You are under arrest."   -- William Gibson

home help back first fref pref prev next nref lref last post