First published: Wed Dec 31 2003(Updated: )
Buffer overflow in the syslog daemon for Solaris 2.6 through 9 allows remote attackers to cause a denial of service (syslogd crash) and possibly execute arbitrary code via long syslog UDP packets.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sun SunOS | =5.7 | |
Sun SunOS | =5.8 | |
Oracle Solaris SPARC | =9.0 | |
Oracle Solaris SPARC | =7.0 | |
Oracle Solaris SPARC | =9.0 | |
Oracle Solaris SPARC | =2.6 | |
Oracle Solaris SPARC | =8.0 | |
Sun SunOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-1066 has a high severity due to its potential to cause denial of service and arbitrary code execution.
The vulnerability can be mitigated by applying patches provided by the vendor for affected Solaris systems.
CVE-2003-1066 affects Solaris versions 2.6 through 9 including specific SunOS versions.
CVE-2003-1066 allows remote attackers to exploit a buffer overflow in the syslog daemon.
An exploitation of CVE-2003-1066 could lead to a syslog daemons crash and unauthorized execution of arbitrary code.