Short Name |
RPC:YPUPDATED-CMD-INJ |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
RPC |
Keywords |
Sun Solaris rpc.ypupdated Command Injection Vulnerability |
Release Date |
2010/09/28 |
Update Number |
1780 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability against Sun Solaris. A successful attack can lead to arbitrary code execution.
Sun Solaris is prone to an arbitrary command execution vulnerability because it fails to adequately sanitize user-supplied data to 'rpc.ypupdated'. Attackers can leverage this issue to execute arbitrary commands on vulnerable computers. Successful exploits will compromise the compromise the computer. This issue occurs only when 'rpc.ypupdated' is started using the '-i' command line switch. This switch is not used by default. Sun Solaris 10 is vulnerable; other versions may also be affected. Reports indicate that this issue was originally discovered in 1994. This BID is being retired as it is a duplicate of the vulnerability discussed in BID 1749 (Multiple Vendor RPC.YPUpdated Command Execution Vulnerability).