First published: Wed Sep 17 2003(Updated: )
The default installation of sadmind on Solaris uses weak authentication (AUTH_SYS), which allows local and remote attackers to spoof Solstice AdminSuite clients and gain root privileges via a certain sequence of RPC packets.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Solaris and Zettabyte File System (ZFS) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0722 is rated as a high severity vulnerability due to the potential for attackers to gain root privileges.
To fix CVE-2003-0722, disable the sadmind RPC service or implement stronger authentication mechanisms.
CVE-2003-0722 affects default installations of Oracle Solaris, particularly on SPARC systems.
Yes, CVE-2003-0722 can be exploited remotely as it allows attackers to send specific RPC packets to the vulnerable service.
Sadmind is a service on Solaris that manages the Solstice AdminSuite, which is vulnerable due to weak authentication in CVE-2003-0722.