Vulnerabilities
Vulnerable Software
Sun:  >> Sunos  >> 4.1.3  Security Vulnerabilities
Local user gains root privileges via buffer overflow in rdist, via lookup() function.
CVSS Score
7.2
EPSS Score
0.007
Published
1996-07-24
Delete or create a file via rpc.statd, due to invalid information.
CVSS Score
5.0
EPSS Score
0.011
Published
1996-04-24
Buffer overflow in syslog utility allows local or remote attackers to gain root privileges.
CVSS Score
10.0
EPSS Score
0.014
Published
1995-10-19
SunOS sendmail 5.59 through 5.65 uses popen to process a forwarding host argument, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable and passing crafted values to the -oR option.
CVSS Score
7.2
EPSS Score
0.001
Published
1995-08-23
Extra long export lists over 256 characters in some mount daemons allows NFS directories to be mounted by anyone.
CVSS Score
5.0
EPSS Score
0.01
Published
1994-02-14
The permissions for the /dev/audio device on Solaris 2.2 and earlier, and SunOS 4.1.x, allow any local user to read from the device, which could be used by an attacker to monitor conversations happening near a machine that has a microphone.
CVSS Score
2.1
EPSS Score
0.001
Published
1993-10-01
/usr/5bin/su in SunOS 4.1.3 and earlier uses a search path that includes the current working directory (.), which allows local users to gain privileges via Trojan horse programs.
CVSS Score
7.2
EPSS Score
0.001
Published
1993-09-17
Sun SunOS 4.1 through 4.1.3 allows local attackers to gain root access via insecure permissions on files and directories such as crash.
CVSS Score
7.2
EPSS Score
0.001
Published
1993-02-03
The portmapper may act as a proxy and redirect service requests from an attacker, making the request appear to come from the local host, possibly bypassing authentication that would otherwise have taken place. For example, NFS file systems could be mounted through the portmapper despite export restrictions.
CVSS Score
7.5
EPSS Score
0.007
Published
1992-06-04


Contact Us

Shodan ® - All rights reserved