Vulnerabilities > CVE-1999-0209 - Unspecified vulnerability in SUN Sunos
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
The SunView (SunTools) selection_svc facility allows remote users to read files.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 7 |
Exploit-Db
description Sun Solaris. CVE-1999-0209. Remote exploit for solaris platform id EDB-ID:5366 last seen 2016-01-31 modified 2008-04-04 published 2008-04-04 reporter I)ruid source https://www.exploit-db.com/download/5366/ title Sun Solaris <= 10 - rpc.ypupdated Remote Root Exploit meta description SunView selection_svc Vulnerability. CVE-1999-0209. Remote exploit for solaris platform id EDB-ID:19040 last seen 2016-02-02 modified 1990-08-14 published 1990-08-14 reporter Peter Shipley source https://www.exploit-db.com/download/19040/ title SunView SunOS <= 4.1.1 selection_svc Vulnerability description Solaris ypupdated Command Execution. CVE-1999-0209. Remote exploit for solaris platform id EDB-ID:16326 last seen 2016-02-01 modified 2010-07-25 published 2010-07-25 reporter metasploit source https://www.exploit-db.com/download/16326/ title Solaris ypupdated Command Execution
Metasploit
description | This exploit targets a weakness in the way the ypupdated RPC application uses the command shell when handling a MAP UPDATE request. Extra commands may be launched through this command shell, which runs as root on the remote host, by passing commands in the format '|'. Vulnerable systems include Solaris 2.7, 8, 9, and 10, when ypupdated is started with the '-i' command-line option. |
id | MSF:EXPLOIT/SOLARIS/SUNRPC/YPUPDATED_EXEC |
last seen | 2020-03-13 |
modified | 2017-07-24 |
published | 2008-04-18 |
references | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0209 |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/solaris/sunrpc/ypupdated_exec.rb |
title | Solaris ypupdated Command Execution |
Packetstorm
data source | https://packetstormsecurity.com/files/download/82327/ypupdated_exec.rb.txt |
id | PACKETSTORM:82327 |
last seen | 2016-12-05 |
published | 2009-10-28 |
reporter | I)ruid |
source | https://packetstormsecurity.com/files/82327/Solaris-ypupdated-Command-Execution.html |
title | Solaris ypupdated Command Execution |