Description
rpc.walld (wall daemon) for Solaris 2.6 through 9 allows local users to send messages to logged on users that appear to come from arbitrary user IDs by closing stderr before executing wall, then supplying a spoofed from header.
Exploits
221202003-01-03localSolaris
Sun Solaris 2.5.1/2.6/7.0/8/9 Wall - Spoofed Message Origin
By Brant Roman
References
cve@mitre.org
http://secunia.com/advisories/7825/cve@mitre.org
http://www.kb.cert.org/vuls/id/944241cve@mitre.org
http://www.securityfocus.com/archive/1/305105cve@mitre.org
http://www.securityfocus.com/bid/6509cve@mitre.org
http://www.securitytracker.com/id?1005882cve@mitre.org
http://www.securitytracker.com/id?1006682af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/7825/af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-26-51980-1af854a3a-2127-422b-91ae-364da2661108
http://www.kb.cert.org/vuls/id/944241af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/305105af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/6509af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1005882af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1006682af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/11608