Логотип exploitDog
bind:CVE-2003-0722
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2003-0722

Количество 2

Количество 2

nvd логотип

CVE-2003-0722

почти 22 года назад

The default installation of sadmind on Solaris uses weak authentication (AUTH_SYS), which allows local and remote attackers to spoof Solstice AdminSuite clients and gain root privileges via a certain sequence of RPC packets.

CVSS2: 10
EPSS: Высокий
github логотип

GHSA-qpx7-pvpr-53xp

больше 3 лет назад

The default installation of sadmind on Solaris uses weak authentication (AUTH_SYS), which allows local and remote attackers to spoof Solstice AdminSuite clients and gain root privileges via a certain sequence of RPC packets.

EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2003-0722

The default installation of sadmind on Solaris uses weak authentication (AUTH_SYS), which allows local and remote attackers to spoof Solstice AdminSuite clients and gain root privileges via a certain sequence of RPC packets.

CVSS2: 10
89%
Высокий
почти 22 года назад
github логотип
GHSA-qpx7-pvpr-53xp

The default installation of sadmind on Solaris uses weak authentication (AUTH_SYS), which allows local and remote attackers to spoof Solstice AdminSuite clients and gain root privileges via a certain sequence of RPC packets.

89%
Высокий
больше 3 лет назад

Уязвимостей на страницу