CVE-2003-1071
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
03/01/2003
Last modified:
03/04/2025
Description
rpc.walld (wall daemon) for Solaris 2.6 through 9 allows local users to send messages to logged on users that appear to come from arbitrary user IDs by closing stderr before executing wall, then supplying a spoofed from header.
Impact
Base Score 2.0
2.10
Severity 2.0
LOW
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:* | ||
cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:* | ||
cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:* | ||
cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:* | ||
cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:* | ||
cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:* | ||
cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/7825/
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-51980-1
- http://www.kb.cert.org/vuls/id/944241
- http://www.securityfocus.com/archive/1/305105
- http://www.securityfocus.com/bid/6509
- http://www.securitytracker.com/id?1005882=
- http://www.securitytracker.com/id?1006682=
- https://exchange.xforce.ibmcloud.com/vulnerabilities/11608
- http://secunia.com/advisories/7825/
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-51980-1
- http://www.kb.cert.org/vuls/id/944241
- http://www.securityfocus.com/archive/1/305105
- http://www.securityfocus.com/bid/6509
- http://www.securitytracker.com/id?1005882=
- http://www.securitytracker.com/id?1006682=
- https://exchange.xforce.ibmcloud.com/vulnerabilities/11608