Check Point Reference: | CPAI-2009-091 |
Date Published: | 12 Jun 2009 |
Severity: | Critical |
Last Updated: | Thursday 01 January, 2009 |
Source: | Secunia Advisory: SA32473 |
Industry Reference: | CVE-2008-3869 |
Protection Provided by: | |
Who is Vulnerable? | Sun Microsystems Solaris 8 Sun Microsystems Solaris 9 |
Vulnerability Description | A buffer overflow vulnerability was identified in the sadmind service within the Sun Solaris operating system. sadmind is a daemon used to control the servers running Sun Solaris operating system. The vulnerability is due to an input validation error occurring when parsing specially crafted RPC requests. Remote attackers could exploit this vulnerability by sending a maliciously crafted request to the vulnerable system. Successful exploitation would allow for arbitrary code injection and execution. |
Update/Patch Avaliable | Vendor's advisory: http://sunsolve.sun.com/search/document.do?assetkey=1-66-259468-1 |
Vulnerability Details | The vulnerability is triggered in sadmind when decoding request parameters. This can be exploited to cause a heap-based buffer overflow via a specially crafted RPC request. |