vendor:
Solaris
by:
I)ruid
N/A
CVSS
N/A
Command Injection
78
CWE
Product Name: Solaris
Affected Version From: Solaris 2.7
Affected Version To: Solaris 10
Patch Exists: YES
Related CWE: CVE-1999-0209, OSVDB-11517, BID-1749
CPE: o:sun:solaris
Metasploit:
N/A
Other Scripts:
https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/solaris/sunrpc/ypupdated_exec, https://www.infosecmatter.com/nessus-plugin-library/?id=147282, https://www.infosecmatter.com/list-of-metasploit-linux-exploits-detailed-spreadsheet/, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/solaris/sunrpc/ypupdated_exec, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/solaris/sunrpc/ypupdated_exec, https://www.infosecmatter.com/nessus-plugin-library/?id=75387, https://www.infosecmatter.com/nessus-plugin-library/?id=46837, https://www.infosecmatter.com/nessus-plugin-library/?id=35919
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Unix, Solaris
2010
Solaris ypupdated Command Execution
This exploit targets a weakness in the way the ypupdated RPC application uses the command shell when handling a MAP UPDATE request. Extra commands may be launched through this command shell, which runs as root on the remote host, by passing commands in the format '|<command>'. Vulnerable systems include Solaris 2.7, 8, 9, and 10, when ypupdated is started with the '-i' command-line option.
Mitigation:
Disable the ypupdated service or restrict access to it.