First published: Wed Jul 03 2002(Updated: )
Format string vulnerability in RPC wall daemon (rpc.rwalld) for Solaris 2.5.1 through 8 allows remote attackers to execute arbitrary code via format strings in a message that is not properly provided to the syslog function when the wall command cannot be executed.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sun SunOS | =5.7 | |
Sun SunOS | =5.8 | |
Oracle Solaris SPARC | =7.0 | |
Oracle Solaris SPARC | =2.6 | |
Oracle Solaris SPARC | =8.0 | |
Sun SunOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0573 is considered a high-severity vulnerability due to its potential for arbitrary code execution.
To fix CVE-2002-0573, you should update the affected Solaris versions to the latest patches provided by the vendor.
CVE-2002-0573 affects Solaris versions 2.5.1 through 8, including SunOS and Solaris SPARC.
CVE-2002-0573 is a format string vulnerability related to the RPC wall daemon.
Yes, CVE-2002-0573 can be exploited remotely by attackers to execute arbitrary code.