First published: Fri Jan 03 2003(Updated: )
rpc.walld (wall daemon) for Solaris 2.6 through 9 allows local users to send messages to logged on users that appear to come from arbitrary user IDs by closing stderr before executing wall, then supplying a spoofed from header.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Solaris SPARC | =2.5.1 | |
Sun SunOS | =5.7 | |
Sun SunOS | =5.8 | |
Oracle Solaris SPARC | =7.0 | |
Oracle Solaris SPARC | =9.0 | |
Sun SunOS | =5.5.1 | |
Oracle Solaris SPARC | =2.6 | |
Oracle Solaris SPARC | =8.0 | |
Sun SunOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-1071 is considered a medium severity vulnerability, as it allows local users to send spoofed messages to other logged-in users.
To remediate CVE-2003-1071, restrict access to the wall daemon or apply patches provided by the vendor for affected Solaris versions.
CVE-2003-1071 affects local users of Solaris versions 2.5.1 to 9.0 and SunOS 5.5.1 to 5.8.
CVE-2003-1071 allows local users to impersonate other users by sending messages, potentially leading to user confusion or exploitation.
CVE-2003-1071 is a local vulnerability, meaning it can only be exploited by authenticated users on the same system.