Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

RPC:SUN-SOLARIS-SADMIND-BO

Severity

High

Recommended

No

Recommended Action

Drop

Category

RPC

Keywords

Sun Solaris sadmind RPC Request Buffer Overflow

Release Date

2011/07/21

Update Number

1959

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

RPC: Sun Solaris sadmind RPC Request Buffer Overflow


This signature detects attempts to exploit a known vulnerability in the Sun Solaris sadmind service. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.

Extended Description

Sun Solaris is prone to multiple buffer-overflow vulnerabilities because the software fails to perform adequate boundary checks on user-supplied input. Attackers can leverage these issues to execute arbitrary code with superuser privileges. Failed attacks will cause denial-of-service conditions. These issues affect Solaris 8 and 9.

Affected Products

  • Avaya CMS Server 14.0
  • Avaya CMS Server 14.1
  • Nortel Networks CDMA W-NMS-CNM
  • Nortel Networks Self-Service - CCSS7
  • Nortel Networks Self-Service MPS 100
  • Nortel Networks Self-Service MPS 1000
  • Nortel Networks Self-Service MPS 500
  • Nortel Networks Self-Service Peri Application
  • Nortel Networks Self-Service Peri CTX
  • Nortel Networks Self-Service Peri Workstation
  • Nortel Networks Self-Service Speech Server
  • Sun Solaris 8 Sparc
  • Sun Solaris 8 X86
  • Sun Solaris 9 Sparc
  • Sun Solaris 9 X86

References

  • BugTraq: 35083
  • CVE: CVE-2008-3869
  • CVE: CVE-2008-3870

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out