exploit-db-mirror/exploits/unix/remote/20879.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

7 lines
No EOL
685 B
Text

source: https://www.securityfocus.com/bid/2763/info
The rpc.yppasswdd server is used to handle password change requests from yppasswd and modify the NIS password file.
A buffer overrun vulnerability has been discovered in the rpc.yppasswdd utility distributed by multiple vendors. The problem occurs due to insufficient bounds checking before copying remotely-supplied user information into a static memory buffer. As a result, a malicious user may be capable of exploiting this issue to overwrite sensitive locations in memory and thus execute arbitrary code with superuser privileges.
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20879.tar.gz