CDE Calendar Manager Service Daemon Buffer Overflow

HIGH (10.0) No Patch (9666 days)

Threat Intelligence

⚠️ CRITICAL GAP - Exploits exist but no detection available
EPSS Score: 5.58% chance of exploitation (percentile: 90%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: Exploit-DB

How we test →

What is it?

The CDE Calendar Manager Service Daemon is a software component used in older Unix systems to manage calendar-related tasks. The vulnerability allows an attacker to execute arbitrary code on the system by exploiting a buffer overflow in the rpc.cmsd service.

Am I affected?

You're affected if you use CDE Calendar Manager Service Daemon versions prior to 3.1u. Check with: find / -name "rpc.cmsd" 2>/dev/null or grep -r "rpc.cmsd" /etc/*

Note: This is a legacy system, and most modern Unix systems have moved away from CDE. If you don't recognize the name, you're probably not affected.

Version info: Not specified in the advisory.

Affected Products

Sun Microsystems / CDE Calendar Manager Service Daemon

How to fix

Upgrade to CDE Calendar Manager Service Daemon version 3.1u or later.
- For immediate mitigation:
+ Restrict network access to your system (firewall it from the public internet)
+ Audit service logs for suspicious activity patterns