Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2001-0779Improper Restriction of Operations within the Bounds of a Memory Buffer in Solaris

8 documents5 sources
Severity
10.0CRITICALNVD
NVD7.5
EPSS
74.3%
top 1.15%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedOct 18
Latest updateApr 30

Description

Buffer overflow in rpc.yppasswdd (yppasswd server) in Solaris 2.6, 7 and 8 allows remote attackers to gain root access via a long username.

CVSS vector

AV:N/AC:L/C:C/I:C/A:CExploitability: 10.0 | Impact: 10.0

Affected Packages2 packages

NVDsun/solaris2.6, 7.0, 8.0+2
NVDsun/sunos5.7, 5.8+1

Patches

🔴Vulnerability Details

4
GHSA
GHSA-36j3-pwc5-6487: Buffer overflow in rpc2022-04-30
GHSA
GHSA-8r29-p7h5-7m8x: Buffer overflow in rpc2022-04-30
CVEList
CVE-2001-1529: Buffer overflow in rpc2005-07-14
CVEList
CVE-2001-0779: Buffer overflow in rpc2002-03-09

💥Exploits & PoCs

1
Exploit-DB
OpenServer 5.0.5/5.0.6 / HP-UX 10/11 / Solaris 2.6/7.0/8 - rpc.yppasswdd Buffer Overrun2001-05-10

🔍Detection Rules

1
Suricata
GPL RPC yppasswd username overflow attempt UDP2010-09-23
CVE-2001-0779 — SUN Solaris vulnerability | cvebase