Vulnerability Name: | CVE-2002-0573 (CCN-8971) | ||||||||||||
Assigned: | 2002-04-30 | ||||||||||||
Published: | 2002-04-30 | ||||||||||||
Updated: | 2018-10-30 | ||||||||||||
Summary: | Format string vulnerability in RPC wall daemon (rpc.rwalld) for Solaris 2.5.1 through 8 allows remote attackers to execute arbitrary code via format strings in a message that is not properly provided to the syslog function when the wall command cannot be executed. | ||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: VULNWATCH Type: UNKNOWN 20020430 [VulnWatch] Adivosry + Exploit for Remote Root Hole in Default Installation of Popular Commercial Operating System Source: CCN Type: Gobbles Security Advisory #32 Remote Root Hole in Default Solaris Installation Source: MITRE Type: CNA CVE-2002-0573 Source: BUGTRAQ Type: Exploit, Patch, Vendor Advisory 20020430 Adivosry + Exploit for Remote Root Hole in Default Installation of Popular Commercial Operating System Source: CCN Type: Sun Alert ID: 44502 Security Vulnerability in the rpc.rwalld(1M) Daemon Source: CCN Type: CERT Advisory CA-2002-10 Format String Vulnerability in rpc.rwalld Source: CERT Type: Patch, Third Party Advisory, US Government Resource CA-2002-10 Source: XF Type: Patch, Vendor Advisory solaris-rwall-format-string(8971) Source: CCN Type: US-CERT VU#638099 rpc.rwalld contains remotely exploitable format string vulnerability Source: CERT-VN Type: US Government Resource VU#638099 Source: OSVDB Type: UNKNOWN 778 Source: CCN Type: OSVDB ID: 778 Solaris rpc.rwalld Remote Format String Arbitrary Code Execution Source: BID Type: Vendor Advisory 4639 Source: CCN Type: BID-4639 Sun Solaris RWall Daemon Syslog Format String Vulnerability Source: XF Type: UNKNOWN solaris-rwall-format-string(8971) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:41 Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:79 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |