Vulnerabilities > CVE-2003-1071 - Unspecified vulnerability in SUN Solaris and Sunos
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
PARTIAL Availability impact
NONE Summary
rpc.walld (wall daemon) for Solaris 2.6 through 9 allows local users to send messages to logged on users that appear to come from arbitrary user IDs by closing stderr before executing wall, then supplying a spoofed from header.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 9 |
Exploit-Db
description | Sun Solaris 2.5.1/2.6/7.0/8/9 Wall Spoofed Message Origin Vulnerability. CVE-2003-1071. Local exploit for solaris platform |
id | EDB-ID:22120 |
last seen | 2016-02-02 |
modified | 2003-01-03 |
published | 2003-01-03 |
reporter | Brant Roman |
source | https://www.exploit-db.com/download/22120/ |
title | Sun Solaris 2.5.1/2.6/7.0/8/9 Wall Spoofed Message Origin Vulnerability |
References
- http://secunia.com/advisories/7825/
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-51980-1
- http://www.kb.cert.org/vuls/id/944241
- http://www.securityfocus.com/archive/1/305105
- http://www.securityfocus.com/bid/6509
- http://www.securitytracker.com/id?1005882
- http://www.securitytracker.com/id?1006682
- https://exchange.xforce.ibmcloud.com/vulnerabilities/11608