ID |
CVE-2003-0722
|
Summary |
The default installation of sadmind on Solaris uses weak authentication (AUTH_SYS), which allows local and remote attackers to spoof Solstice AdminSuite clients and gain root privileges via a certain sequence of RPC packets. |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 10.0 (as of 11-10-2017 - 01:29) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
COMPLETE |
COMPLETE |
COMPLETE |
|
cvss-vector
via4
|
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
oval
via4
|
accepted | 2010-09-20T04:00:10.757-04:00 | class | vulnerability | contributors | name | Brian Soby | organization | The MITRE Corporation |
name | Brian Soby | organization | The MITRE Corporation |
name | Jonathan Baker | organization | The MITRE Corporation |
name | Todd Dolinsky | organization | Opsware, Inc. |
name | Todd Dolinsky | organization | Opsware, Inc. |
name | Jonathan Baker | organization | The MITRE Corporation |
| description | The default installation of sadmind on Solaris uses weak authentication (AUTH_SYS), which allows local and remote attackers to spoof Solstice AdminSuite clients and gain root privileges via a certain sequence of RPC packets. | family | unix | id | oval:org.mitre.oval:def:1273 | status | accepted | submitted | 2004-10-15T02:06:00.000-04:00 | title | Solaris SAdmin Client Credentials Remote Administrative Access Vulnerability | version | 39 |
|
refmap
via4
|
|
saint
via4
|
bid | 8615 | description | sadmind AUTH_SYS authentication vulnerability | id | rpc_sadmindauth | osvdb | 4585 | title | sadmind_auth_sys | type | remote |
|
Last major update |
11-10-2017 - 01:29 |
Published |
22-09-2003 - 04:00 |
Last modified |
11-10-2017 - 01:29 |