Vulnerabilities > CVE-2002-0573 - Unspecified vulnerability in SUN Solaris and Sunos

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
sun
nessus

Summary

Format string vulnerability in RPC wall daemon (rpc.rwalld) for Solaris 2.5.1 through 8 allows remote attackers to execute arbitrary code via format strings in a message that is not properly provided to the syslog function when the wall command cannot be executed.

Vulnerable Configurations

Part Description Count
OS
Sun
6

Nessus

NASL familyRPC
NASL idRWALLD_FORMAT_STRING.NASL
descriptionThe rpc.walld RPC service is running. Some versions of this server allow an attacker to gain root access remotely, by consuming the resources of the remote host then sending a specially formed packet with format strings to this host. Solaris 2.5.1, 2.6, 7, 8 and 9 are vulnerable to this issue. Other operating systems might be affected as well. Nessus did not check for this vulnerability, so this might be a false positive.
last seen2020-06-01
modified2020-06-02
plugin id10950
published2002-05-02
reporterThis script is Copyright (C) 2002-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/10950
titleSolaris rpc.rwalld Remote Format String Arbitrary Code Execution

Oval

  • accepted2010-09-20T04:00:22.248-04:00
    classvulnerability
    contributors
    • nameDavid Proulx
      organizationThe MITRE Corporation
    • nameTodd Dolinsky
      organizationOpsware, Inc.
    • nameJonathan Baker
      organizationThe MITRE Corporation
    descriptionFormat string vulnerability in RPC wall daemon (rpc.rwalld) for Solaris 2.5.1 through 8 allows remote attackers to execute arbitrary code via format strings in a message that is not properly provided to the syslog function when the wall command cannot be executed.
    familyunix
    idoval:org.mitre.oval:def:41
    statusaccepted
    submitted2003-01-30T12:00:00.000-04:00
    titleSolaris 7 RWall Daemon Syslog Format String Vulnerability
    version37
  • accepted2010-09-20T04:00:36.762-04:00
    classvulnerability
    contributors
    • nameDavid Proulx
      organizationThe MITRE Corporation
    • nameTodd Dolinsky
      organizationOpsware, Inc.
    • nameJonathan Baker
      organizationThe MITRE Corporation
    descriptionFormat string vulnerability in RPC wall daemon (rpc.rwalld) for Solaris 2.5.1 through 8 allows remote attackers to execute arbitrary code via format strings in a message that is not properly provided to the syslog function when the wall command cannot be executed.
    familyunix
    idoval:org.mitre.oval:def:79
    statusaccepted
    submitted2003-01-30T12:00:00.000-04:00
    titleSolaris 8 RWall Daemon Syslog Format String Vulnerability
    version37