First published: Fri Dec 31 1999(Updated: )
Buffer overflow in nlps_server in Sun Solaris x86 2.4, 2.5, and 2.5.1 allows remote attackers to execute arbitrary code as root via a long string beginning with "NLPS:002:002:" to the listen (aka System V listener) port, TCP port 2766.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Solaris SPARC | =2.4 | |
Oracle Solaris SPARC | =2.5.1 | |
Oracle Solaris SPARC | =2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-1588 has a critical severity rating as it allows remote attackers to execute arbitrary code as root.
To fix CVE-1999-1588, update to the latest patch or version of Sun Solaris that addresses this vulnerability.
CVE-1999-1588 affects Sun Solaris versions 2.4, 2.5, and 2.5.1 on x86 architecture.
CVE-1999-1588 is exploited through buffer overflow attacks via a specially crafted long string sent to TCP port 2766.
Yes, CVE-1999-1588 can be exploited remotely by attackers targeting the vulnerable nlps_server.