Vulnerability Name:

CVE-2002-0573 (CCN-8971)

Assigned:2002-04-30
Published:2002-04-30
Updated:2018-10-30
Summary:Format string vulnerability in RPC wall daemon (rpc.rwalld) for Solaris 2.5.1 through 8 allows remote attackers to execute arbitrary code via format strings in a message that is not properly provided to the syslog function when the wall command cannot be executed.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: VULNWATCH
Type: UNKNOWN
20020430 [VulnWatch] Adivosry + Exploit for Remote Root Hole in Default Installation of Popular Commercial Operating System

Source: CCN
Type: Gobbles Security Advisory #32
Remote Root Hole in Default Solaris Installation

Source: MITRE
Type: CNA
CVE-2002-0573

Source: BUGTRAQ
Type: Exploit, Patch, Vendor Advisory
20020430 Adivosry + Exploit for Remote Root Hole in Default Installation of Popular Commercial Operating System

Source: CCN
Type: Sun Alert ID: 44502
Security Vulnerability in the rpc.rwalld(1M) Daemon

Source: CCN
Type: CERT Advisory CA-2002-10
Format String Vulnerability in rpc.rwalld

Source: CERT
Type: Patch, Third Party Advisory, US Government Resource
CA-2002-10

Source: XF
Type: Patch, Vendor Advisory
solaris-rwall-format-string(8971)

Source: CCN
Type: US-CERT VU#638099
rpc.rwalld contains remotely exploitable format string vulnerability

Source: CERT-VN
Type: US Government Resource
VU#638099

Source: OSVDB
Type: UNKNOWN
778

Source: CCN
Type: OSVDB ID: 778
Solaris rpc.rwalld Remote Format String Arbitrary Code Execution

Source: BID
Type: Vendor Advisory
4639

Source: CCN
Type: BID-4639
Sun Solaris RWall Daemon Syslog Format String Vulnerability

Source: XF
Type: UNKNOWN
solaris-rwall-format-string(8971)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:41

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:79

Vulnerable Configuration:Configuration 1:
  • cpe:/o:sun:sunos:5.6:*:*:*:*:*:*:*
  • OR cpe:/o:sun:solaris:7.0:*:x86:*:*:*:*:*
  • OR cpe:/o:sun:solaris:8.0:*:x86:*:*:*:*:*
  • OR cpe:/o:sun:sunos:-:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.7:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.8:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:sun:sunos:5.6:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.8:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.9:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.7:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:41
    V
    Solaris 7 RWall Daemon Syslog Format String Vulnerability
    2010-09-20
    oval:org.mitre.oval:def:79
    V
    Solaris 8 RWall Daemon Syslog Format String Vulnerability
    2010-09-20
    BACK
    sun solaris 2.6
    sun solaris 7.0
    sun solaris 8.0
    sun sunos -
    sun sunos 5.7
    sun sunos 5.8
    sun solaris 2.6
    sun solaris 8
    sun solaris 9
    sun solaris 7.0