First published: Tue Jun 03 2003(Updated: )
The Telnet daemon (in.telnetd) for Solaris 2.6 through 9 allows remote attackers to cause a denial of service (CPU consumption by infinite loop).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sun SunOS | =5.7 | |
Sun SunOS | =5.8 | |
Oracle Solaris SPARC | =9.0 | |
Oracle Solaris SPARC | =7.0 | |
Oracle Solaris SPARC | =9.0 | |
Oracle Solaris SPARC | =2.6 | |
Oracle Solaris SPARC | =8.0 | |
Sun SunOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-1069 is classified as a moderate severity vulnerability due to its potential to cause denial of service.
To fix CVE-2003-1069, you should upgrade to the patched versions of the Solaris operating system that mitigate this Telnet daemon issue.
CVE-2003-1069 affects Solaris versions 2.6 through 9, including SunOS 5.7, 5.8, and 8.0.
CVE-2003-1069 allows remote attackers to exploit the Telnet daemon, leading to CPU consumption and denial of service.
CVE-2003-1069 is a remote vulnerability, allowing attackers to impact the system without local access.