ypbind is the client-end NIS software package. The ypbind implementation written for Linux systems is vulnerable to a locally exploitable format string vulnerability. The vulnerability exists in ypbind's logging functionality and can result in root access for a malicious local user if exploited. User supplied data, part of the request, is passed to a *printf function as part of the format string. If a special string is constructed using format specifiers, memory on the stack can be overwritten and arbitrary code executed. It has also been reported that there are other attacks against ypbind which may be remotely exploitable, though these are uncomfirmed.
ypbind is the client-end NIS software package. The ypbind implementation written for Linux systems is vulnerable to a locally exploitable format string vulnerability. The vulnerability exists in ypbind's logging functionality and can result in root access for a malicious local user if exploited. User supplied data, part of the request, is passed to a *printf function as part of the format string. If a special string is constructed using format specifiers, memory on the stack can be overwritten and arbitrary code executed. It has also been reported that there are other attacks against ypbind which may be remotely exploitable, though these are uncomfirmed.