Buffer Overflow Vulnerability in Calendar Manager Service Daemon, rpc.cmsd

Original release date: July 16, 1999
Last revised: January 7, 2000
Updated HP vendor information.
Source: CERT/CC

A complete revision history is at the end of this file.

Systems Affected

  • Systems running the Calendar Manager Service daemon, often named rpc.cmsd

I. Description

A buffer overflow vulnerability has been discovered in the Calendar Manager Service daemon, rpc.cmsd. The rpc.cmsd daemon is frequently distributed with the Common Desktop Environment (CDE) and Open Windows.

II. Impact

Remote and local users can execute arbitrary code with the privileges of the rpc.cmsd daemon, typically root. Under some configurations rpc.cmsd runs with an effective userid of daemon, while retaining root privileges.

This vulnerability is being exploited in a significant number of incidents reported to the CERT/CC. An exploit script was posted to BUGTRAQ. For more information about attacks using various RPC services please see CERT® Incident Note IN-99-04 http://www.cert.org/incident_notes/IN-99-04.html

III. Solution

Install a patch from your vendor

Appendix A contains information provided by vendors for this advisory. We will update the appendix as we receive more information. If you do not see your vendor's name, the CERT/CC did not hear from that vendor. Please contact your vendor directly.

We will update this advisory as more information becomes available. Please check the CERT/CC Web site for the most current revision.

Disable the rpc.cmsd daemon

If you are unable to apply patches to correct this vulnerability, you may wish to disable the rpc.cmsd daemon. If you disable rpc.cmsd, it may affect your ability to manage calendars.

Appendix A: Vendor Information

Fujitsu
Fujitsu's UXP/V operating system is not vulnerable.
Hewlett-Packard Company

Patches are available. Please see the following document for details:

HPSBUX9908-102 Security Vulnerability in rpc.cmsd

IBM Corporation
AIX is not vulnerable to the rpc.cmsd remote buffer overflow.
IBM and AIX are registered trademarks of International Business Machines Corporation.
Santa Cruz Operation, Inc.

SCO is investigating this problem. The following SCO product contains CDE and is potentially vulnerable:

  • SCO UnixWare 7

The following SCO products do not contain CDE, and are therefore believed not to be vulnerable:

  • SCO UnixWare 2.1
  • SCO OpenServer 5
  • SCO Open Server 3.0
  • SCO CMW+

SCO will provide further information and patches if necessary as soon as possible at http://www.sco.com/security.

Silicon Graphics, Inc.

IRIX does not have dtcm or rpc.cmsd and therefore is NOT vulnerable.

UNICOS does not have dtcm or rpc.cmsd and therefore is NOT vulnerable.

Sun Microsystems, Inc.
The following patches are available:

OpenWindows:

    SunOS version     Patch ID
    _____________     _________
    SunOS 5.5.1       104976-04
    SunOS 5.5.1_x86   105124-03
    SunOS 5.5         103251-09
    SunOS 5.5_x86     103273-07
    SunOS 5.3         101513-14
    SunOS 4.1.4       100523-25
    SunOS 4.1.3_U1    100523-25

CDE:

    CDE version       Patch ID
    ___________       ________
    1.3               107022-03
    1.3_x86           107023-03
    1.2               105566-07
    1.2_x86           105567-08

Patches for SunOS 5.4 and CDE 1.0.2 and 1.0.1 will be available within a week of the release of this advisory.

Sun security patches are available at:

http://sunsolve.sun.com/pub-cgi/show.pl?target=patches/patch-license&nav=pubpatches


The CERT Coordination Center would like to thank Chok Poh of Sun Microsystems, David Brumley of Stanford University, and Elias Levy of Security Focus for their assistance in preparing this advisory.

Copyright 1999 Carnegie Mellon University.


Revision History
January 7, 2000  Updated HP vendor information
July 22, 1999  Added link to IN-99-04 in the "Impact" section
July 20, 1999  Updated the advisory title
July 16, 1999  Initial release