Description
Buffer overflow in Embedded Support Partner (ESP) daemon (rpc.espd) in IRIX 6.5.8 and earlier allows remote attackers to execute arbitrary commands.
Products
- SGI IRIX
- SGI IRAX
- SGI IRIX 4.0.1
- SGI IRIX 4.0.1T
- SGI IRIX 4.0.2
- SGI IRIX 4.0.3
- SGI IRIX 4.0.4
- SGI IRIX 4.0.4B
- SGI IRIX 4.0.4T
- SGI IRIX 4.0.5
- SGI IRIX 4.0.5 IOP
- SGI IRIX 4.0.5A
- SGI IRIX 4.0.5B
- SGI IRIX 4.0.5D
- SGI IRIX 4.0.5E
- SGI IRIX 4.0.5F
- SGI IRIX 4.0.5G
- SGI IRIX 4.0.5H
- SGI IRIX 5.0.1
- SGI IRIX 5.1.1
- SGI IRIX 5.1
- SGI IRIX 5.2
- SGI IRIX 5.3
- SGI IRIX 5.3 XFS
- SGI IRIX 6.0.1
- SGI IRIX 6.0.1 XFS
- SGI IRIX 6.0
- SGI IRIX 6.1
- SGI IRIX 6.2
- SGI IRIX 6.3
- SGI IRIX 6.4
- SGI IRIX 6.5.1
- SGI IRIX 6.5.2
- SGI IRIX 6.5.2f
- SGI IRIX 6.5.2m
- SGI IRIX 6.5.3
- SGI IRIX 6.5.3f
- SGI IRIX 6.5.3m
- SGI IRIX 6.5.4
- SGI IRIX 6.5.4f
- SGI IRIX 6.5.4m
- SGI IRIX 6.5.5
- SGI IRIX 6.5.5f
- SGI IRIX 6.5.5m
- SGI IRIX 6.5.6
- SGI IRIX 6.5.6f
- SGI IRIX 6.5.6m
- SGI IRIX 6.5.7
- SGI IRIX 6.5.7f
- SGI IRIX 6.5.7m
- SGI IRIX 6.5.8
- SGI IRIX 6.5
Questions to Ask Vendors
- Can you confirm whether your systems are affected by CVE-2001-0331, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2001-0331 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions
- Check out the advisory links provided below.
References