Description
The default installation of sadmind on Solaris uses weak authentication (AUTH_SYS), which allows local and remote attackers to spoof Solstice AdminSuite clients and gain root privileges via a certain sequence of RPC packets.
Product(s):
- Sun Solaris
- Sun Solaris 1.0.1
- Sun Solaris 1.0
- Sun Solaris 1.1.1a
- Sun Solaris 1.1.2
- Sun Solaris 1.1.3
- Sun Solaris 1.1.4
- Sun Solaris 1.1
- Sun Solaris 1.1c
- Sun Solaris 1.2
- Sun Solaris 10.0
- Sun Solaris 10.0 for SPARC
- Sun Solaris 10
- Sun Solaris 11.0
- Sun Solaris 11
- Sun Solaris 2.0
- Sun Solaris 2.1
- Sun Solaris 2.2
- Sun Solaris 2.3
- Sun Solaris 2.4
- Sun Solaris 2.5.1
- Sun Solaris 2.5
- Sun Solaris 2.6
- Sun Solaris 2.6 HW3
- Sun Solaris 2.6 x86HW3
- Sun Solaris 2.6 HW5
- Sun Solaris 2.6 x86HW5
- Sun Solaris 2.7
- Sun Solaris 2.8
- Sun Solaris 4.1.1
- Sun Solaris 4.1.2
- Sun Solaris 4.1.3
- Sun Solaris 4.1.3 U1
- Sun Solaris 5.3
- Sun Solaris 5.4
- Sun Solaris 5.5.1
- Sun Solaris 5.5
- Sun Solaris 5.6
- Sun Solaris 5.8
- Sun Solaris 5.9
- Sun Solaris 7.0
- Sun Solaris 8.0
- Sun Solaris 8.1
- Sun Solaris 8.2
- Sun Solaris 8
- Sun Solaris 9.0
- Sun Solaris 9.0 for SPARC
- Sun Solaris 9.1
- Sun Solaris 9
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2003-0722, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2003-0722 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.