You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
"description": "This module exploits a buffer overflow vulnerability in adm_build_path()\n function of sadmind daemon.\n\n The distributed system administration daemon (sadmind) is the daemon used by\n Solstice AdminSuite applications to perform distributed system administration\n operations.\n\n The sadmind daemon is started automatically by the inetd daemon whenever a\n request to invoke an operation is received. The sadmind daemon process\n continues to run for 15 minutes after the last request is completed, unless a\n different idle-time is specified with the -i command line option. The sadmind\n daemon may be started independently from the command line, for example, at\n system boot time. In this case, the -i option has no effect; sadmind continues\n to run, even if there are no active requests.",
114103
+
"description": "This module exploits a buffer overflow vulnerability in adm_build_path()\n function of Sun Solstice AdminSuite sadmind daemon.\n\n The distributed system administration daemon (sadmind) is the daemon used by\n Solstice AdminSuite applications to perform distributed system administration\n operations.\n\n The sadmind daemon is started automatically by the inetd daemon whenever a\n request to invoke an operation is received. The sadmind daemon process\n continues to run for 15 minutes after the last request is completed, unless a\n different idle-time is specified with the -i command line option. The sadmind\n daemon may be started independently from the command line, for example, at\n system boot time. In this case, the -i option has no effect; sadmind continues\n to run, even if there are no active requests.",
"description": "This exploit targets a weakness in the default security\n settings of the sadmind RPC application. This server is\n installed and enabled by default on most versions of the\nSolaris operating system.\n\n Vulnerable systems include solaris 2.7, 8, and 9",
114153
+
"description": "This exploit targets a weakness in the default security settings of\n the Sun Solstice AdminSuite distributed system administration daemon\n (sadmind) RPC application. This server is installed and enabled by\n default on most versions of the Solaris operating system.\n\n Vulnerable systems include Solaris 2.7, 8, and 9.",
0 commit comments