2.1
CVSSv2

CVE-2003-1071

Published: 03/01/2003 Updated: 30/10/2018
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
VMScore: 215
Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

rpc.walld (wall daemon) for Solaris 2.6 through 9 allows local users to send messages to logged on users that appear to come from arbitrary user IDs by closing stderr before executing wall, then supplying a spoofed from header.

Vulnerable Product Search on Vulmon Subscribe to Product

sun sunos 5.7

sun solaris 7.0

sun sunos 5.8

sun solaris 8.0

sun sunos 5.5.1

sun solaris 2.5.1

sun solaris 9.0

sun solaris 2.6

sun sunos -

Exploits

source: wwwsecurityfocuscom/bid/6509/info Solaris is the freely available UNIX Operating System variant distributed by Sun Microsystems The wall client packaged with Solaris makes assumptions about a user's environment when the client is executed The assumption is made that if the file descriptor of stderr points to a tty when wall is ...