The wall daemon can be used for denial of service, social engineering attacks, or to execute remote commands.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 1999-09-29T04:00:00
Updated: 2024-08-01T16:27:57.764Z
Reserved: 1999-06-07T00:00:00
Link: CVE-1999-0181
Vulnrichment
No data.
NVD
Status : Modified
Published: 1994-01-01T05:00:00.000
Modified: 2022-08-17T07:15:13.373
Link: CVE-1999-0181
Redhat
No data.