GEN:SID 1:1398
Message EXPLOIT CDE dtspcd exploit attempt
Summary This event is generated when an attempt is made to exploit a buffer overflow condition in the dtspcd daemon.
Impact Serious. System compromize presenting the attacker with the opportunity to execute arbitrary code.
Detailed Information Certain versions of the Common Desktop Environment (CDE) subprocess control service (dtspcd) contain a programming error that allows an attacker to execute arbitrary code.

dtspcd is used to launch remote applications over a network connection. CDE is used on UNIX and Linux systems as a graphical window manager, it was the default X windows interface on Sun systems until the switch to Gnome.
Affected Systems  
Attack Scenarios Exploit scripts are available
Ease of Attack Simple. Exploits are available.
Corrective Action Upgrade to the latest non-affected version of the software.
Additional References CVE:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0803

CERT:
http://www.cert.org/advisories/CA-2002-01.html
http://www.cert.org/advisories/CA-2001-31.html
http://www.kb.cert.org/vuls/id/172583
Rule References bugtraq: 3517
cve: 2001-0803
url: www.cert.org/advisories/CA-2002-01.html