First published: Thu Oct 18 2001(Updated: )
Buffer overflow in rpc.yppasswdd (yppasswd server) in Solaris 2.6, 7 and 8 allows remote attackers to gain root access via a long username.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Solaris SPARC | =2.6 | |
Oracle Solaris SPARC | =7.0 | |
Oracle Solaris SPARC | =8.0 | |
Sun SunOS | ||
Sun SunOS | =5.7 | |
Sun SunOS | =5.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2001-0779 is classified as critical due to its potential to grant attackers root access.
To fix CVE-2001-0779, it is recommended to apply the latest security patches provided by Oracle for affected versions of Solaris.
CVE-2001-0779 affects Solaris versions 2.6, 7, and 8, as well as several versions of SunOS.
CVE-2001-0779 is a buffer overflow vulnerability that allows remote attackers to exploit it through a long username.
Yes, CVE-2001-0779 can be exploited remotely, as it targets the yppasswd server which listens for incoming requests.