CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
EPSS
Percentile
66.1%
Attackers are using the presence of the dgld service to identify SGI IRIX systems.
The CERT/CC has received multiple reports of an apparent vulnerability in the Distributed GL Daemon on SGI IRIX systems. Upon further investigation, it is our belief that no vulnerability exists in dgld. However, this activity is still significant in that it allows attackers to identify systems running IRIX, which can subsequently be attacked via vulnerabilities such as the ObjectServer (VU#16642) or df (VU#20851) vulnerabilities.
Remote users scanning for a dgld service running port on port 5232 may be able to identify victim sites running IRIX.
The CERT/CC does not believe that there is a vulnerability in dgld. However, sites that do not use dgld should disable it on IRIX hosts to avoid exposing information about the nature of such hosts.
28027
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: May 11, 2000 Updated: December 22, 2000
Not Affected
Currently, there are no known vulernabilities in dgld.
The vendor has not provided us with any further information regarding this vulnerability.
Scanning for dgld running on port 5232 may uniquely identify IRIX systems for subsequent attack.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%2328027 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
The CERT/CC thanks SGI for their assistance in researching this issue.
This document was written by Jeffrey P Lanza.
CVE IDs: | CVE-2000-0893 |
---|---|
Severity Metric: | 0.14 Date Public: |