Short Name |
RPC:RPC.WALLD:WALLD-ERR-FTSTR-2 |
---|---|
Severity |
Medium |
Recommended |
No |
Category |
RPC |
Keywords |
RPC.rwalld Error Message Format String Vulnerability (2) |
Release Date |
2006/01/27 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit the format string vulnerability in the error message generated by walld in Sun Solaris. Sun Solaris 8 and earlier versions are vulnerable. The rwall daemon (rpc.rwalld) listens for network wall requests and sends wall commands; if the rwall daemon cannot send the wall command, it displays an error message. A successful attack can cause the following conditions: consume system resources, prevent wall commands, trigger the rwall daemon error message, or execute commands with rwall daemon permissions (typically root).
Solaris is the freely available UNIX-derivative operating system developed and distributed by Sun Microsystems. A format-string vulnerability allows attackers to execute arbitrary code on vulnerable systems. When malicious format strings are sent from one system to another, an insecure 'syslog' call may allow a remote attacker to exploit the call to execute arbitrary code.