发布时间 :1998-12-01 00:00:00
修订时间 :2008-09-09 08:34:36

[原文]Remote attackers can perform a denial of service using IRIX fcagent.

[CNNVD]IRIX fcagent拒绝服务漏洞(CNNVD-199812-004)

        IRIX fcagent存在漏洞。远程攻击者可以导致服务拒绝。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  SGI  19981201-01-PX

- 漏洞信息

IRIX fcagent拒绝服务漏洞
中危 未知
1998-12-01 00:00:00 2005-05-02 00:00:00
        IRIX fcagent存在漏洞。远程攻击者可以导致服务拒绝。

- 公告与补丁


- 漏洞信息

IRIX fcagent Unspecified Remote DoS
Remote / Network Access Denial of Service
Loss of Availability

- 漏洞描述

IRIX contains a flaw that may allow a remote denial of service. The issue is triggered when a malicious attacker causes the fcagent daemon to disable a FibreVault enclosure. The vulnerability can be exploited remotely by using carefully crafted RPC packets that are sent to the fcagent(1m) daemon, and will result in loss of availability for the service.

- 时间线

1998-12-10 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 6.5.2 or higher, as it has been reported to fix this vulnerability. Also, Silicon Graphics, Inc. has released patches to address this vulnerability. It is also possible to correct the flaw by implementing the following workaround: 1) Become the root user on the system. % /bin/su - Password: # 2) Verify fcagent(1m) daemon is enabled. # chkconfig Flag State ==== ===== fcagent on 3) Disable fcagent(1m) daemon. # chkconfig fcagent off 4) Verify fcagent(1m) daemon has been disabled. # chkconfig Flag State ==== ===== fcagent off 5) Stop any currently running fcagent(1m) daemon. # /etc/init.d/fcagent stop 6) Return to previous level. # exit %

- 相关参考

- 漏洞作者

Unknown or Incomplete