CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
admintool in Solaris allows a local user to write to arbitrary files and gain root access. |
Kerberos 4 key servers allow a user to masquerade as another by breaking and generating session keys. |
A race condition in the Solaris ps command allows an attacker to overwrite critical files. |
The passwd command in Solaris can be subjected to a denial of service. |
Solaris rpcbind listens on a high numbered UDP port, which may not be filtered since the standard port number is 111. |
Solaris rpcbind can be exploited to overwrite arbitrary files and gain root access. |
Extra long export lists over 256 characters in some mount daemons allows NFS directories to be mounted by anyone. |
Automount daemon automountd allows local or remote users to gain privileges via shell metacharacters. |
Solaris rpc.mountd generates error messages that allow a remote attacker to determine what files are on the server. |
libnsl in Solaris allowed an attacker to perform a denial of service of rpcbind. |
Solaris syslogd crashes when receiving a message from a host that doesn't have an inverse DNS entry. |
Buffer overflow in SunOS/Solaris ps command. |
SunOS/Solaris FTP clients can be forced to execute arbitrary commands from a malicious FTP server. |
Buffer overflow in BNU UUCP daemon (uucpd) through long hostnames. |
Buffer overflow in Solaris fdformat command gives root access to local users. |
Buffer overflow in the libauth library in Solaris allows local users to gain additional privileges, possibly root access. |
The Sun sdtcm_convert calendar utility for OpenWindows has a buffer overflow which can gain root access. |
In Sun Solaris and SunOS, man and catman contain vulnerabilities that allow overwriting arbitrary files. |
rpc.statd allows remote attackers to forward RPC calls to the local operating system via the SM_MON and SM_NOTIFY commands, which in turn could be used to remotely exploit other bugs such as in automountd. |
The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote attacker to execute commands. |