Exploit Solaris 2.x/7.0/8 LPD - Remote Command Execution

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
21097
Проверка EDB
  1. Пройдено
Автор
RON1N
Тип уязвимости
REMOTE
Платформа
SOLARIS
CVE
cve-2001-1583
Дата публикации
2001-08-31
Код:
source: https://www.securityfocus.com/bid/3274/info

The print protocol daemon, 'in.lpd' (or 'lpd'), shipped with Solaris may allow for remote attackers to execute arbitrary commands on target hosts with superuser privileges.

The alleged vulnerability is not the buffer overflow discovered by ISS.

It has been reported that it is possible to execute commands on target hosts through lpd by manipulating the use of sendmail by the daemon.

If this vulnerability is successfully exploited, remote attackers can execute any command on the target host with superuser privileges.

This vulnerability is very similar to one mentioned in NAI advisory NAI-0020.

NOTE: It has been reported that a valid printer does NOT need to be configured to exploit this vulnerability.

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21097.tar.gz
 
Источник
www.exploit-db.com

Похожие темы