Логотип exploitDog
bind:CVE-2003-0722
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2003-0722

Количество 2

Количество 2

nvd логотип

CVE-2003-0722

больше 22 лет назад

The default installation of sadmind on Solaris uses weak authentication (AUTH_SYS), which allows local and remote attackers to spoof Solstice AdminSuite clients and gain root privileges via a certain sequence of RPC packets.

CVSS2: 10
EPSS: Высокий
github логотип

GHSA-qpx7-pvpr-53xp

почти 4 года назад

The default installation of sadmind on Solaris uses weak authentication (AUTH_SYS), which allows local and remote attackers to spoof Solstice AdminSuite clients and gain root privileges via a certain sequence of RPC packets.

EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2003-0722

The default installation of sadmind on Solaris uses weak authentication (AUTH_SYS), which allows local and remote attackers to spoof Solstice AdminSuite clients and gain root privileges via a certain sequence of RPC packets.

CVSS2: 10
87%
Высокий
больше 22 лет назад
github логотип
GHSA-qpx7-pvpr-53xp

The default installation of sadmind on Solaris uses weak authentication (AUTH_SYS), which allows local and remote attackers to spoof Solstice AdminSuite clients and gain root privileges via a certain sequence of RPC packets.

87%
Высокий
почти 4 года назад

Уязвимостей на страницу