Arbitrary User ID Spoofing Vulnerability in Solaris rpc.walld

Arbitrary User ID Spoofing Vulnerability in Solaris rpc.walld

CVE-2003-1071 · LOW Severity

AV:L/AC:L/AU:N/C:N/I:P/A:N

rpc.walld (wall daemon) for Solaris 2.6 through 9 allows local users to send messages to logged on users that appear to come from arbitrary user IDs by closing stderr before executing wall, then supplying a spoofed from header.

Learn more about our Cis Benchmark Audit For Oracle Solaris.