10
CVSSv2

CVE-2007-0882

Published: 12/02/2007 Updated: 14/02/2024
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Argument injection vulnerability in the telnet daemon (in.telnetd) in Solaris 10 and 11 (SunOS 5.10 and 5.11) misinterprets certain client "-f" sequences as valid requests for the login program to skip authentication, which allows remote malicious users to log into certain accounts, as demonstrated by the bin account.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

oracle solaris 11

sun sunos 5.11

sun sunos 5.10

oracle solaris 10

Exploits

## # $Id$ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote include Ms ...
## # $Id: fuserrb 9583 2010-06-22 19:11:05Z todb $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metasploi ...
#!/bin/sh # CLASSIFIED CONFIDENTIAL SOURCE MATERIAL # # *********************ATTENTION******************************** # THIS CODE _MUST NOT_ BE DISCLOSED TO ANY THIRD PARTIES # (C) COPYRIGHT Kingcope, 2007 # ################################################################ echo "" echo "SunOS 510/511 intelnetd Remote Exploit by Kingcope kingcope ...

Recent Articles

Solaris offers fix for zero-day vuln
The Register • Gavin Clarke • 01 Mar 2007

Worm turns

Sun Microsystems has urged users to update and secure their Solaris 10 installations after a recently discovered zero-day vulnerability was found in the wild. Sun has posted an online workaround to disable the Solaris 10 telnet service, while advising users to apply patches or protect user accounts using firewalls or IP filtering. "Until patches can be applied, you may wish to block access to the telnet service from untrusted networks such as the internet. Use a firewall or other packet-filterin...