CERTA-2004-AVI-387

Vulnerability from certfr_avis - Published: 2004-12-08 - Updated: 2004-12-08

None

Description

Le service rwho permet à des utilisateurs distants de savoir qui est connecté sur le serveur. Il n'est pas activé par défaut.

Une vulnérabilité présente dans ce service permet l'exécution de code arbitraire avec les droits de l'administrateur. Cette vulnérabilité est exploitable à distance.

Solution

Appliquer le correctif disponible sur le site de l'éditeur, en fonction de la version du système d'exploitation et de l'architecture du système (voir Documentation).

Sun Solaris 7, 8 et 9.

Impacted products
Vendor Product Description
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cP\u003eSun Solaris 7, 8 et 9.\u003c/P\u003e",
  "content": "## Description\n\nLe service rwho permet \u00e0 des utilisateurs distants de savoir qui est\nconnect\u00e9 sur le serveur. Il n\u0027est pas activ\u00e9 par d\u00e9faut.\n\nUne vuln\u00e9rabilit\u00e9 pr\u00e9sente dans ce service permet l\u0027ex\u00e9cution de code\narbitraire avec les droits de l\u0027administrateur. Cette vuln\u00e9rabilit\u00e9 est\nexploitable \u00e0 distance.\n\n## Solution\n\nAppliquer le correctif disponible sur le site de l\u0027\u00e9diteur, en fonction\nde la version du syst\u00e8me d\u0027exploitation et de l\u0027architecture du syst\u00e8me\n(voir Documentation).\n",
  "cves": [],
  "initial_release_date": "2004-12-08T00:00:00",
  "last_revision_date": "2004-12-08T00:00:00",
  "links": [],
  "reference": "CERTA-2004-AVI-387",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2004-12-08T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": null,
  "title": "Vuln\u00e9rabilit\u00e9 dans le service rwho sous Solaris",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Sun 57659 du 06 d\u00e9cembre 2004",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57659-1"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…