Skip to content

Commit a179669

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 37136b8 commit a179669

File tree

1 file changed

+29
-9
lines changed

1 file changed

+29
-9
lines changed

db/modules_metadata_base.json

Lines changed: 29 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -114100,11 +114100,11 @@
114100114100
"Ramon de C Valle <[email protected]>",
114101114101
"Adriano Lima <[email protected]>"
114102114102
],
114103-
"description": "This module exploits a buffer overflow vulnerability in adm_build_path()\n function of sadmind daemon.\n\n The distributed system administration daemon (sadmind) is the daemon used by\n Solstice AdminSuite applications to perform distributed system administration\n operations.\n\n The sadmind daemon is started automatically by the inetd daemon whenever a\n request to invoke an operation is received. The sadmind daemon process\n continues to run for 15 minutes after the last request is completed, unless a\n different idle-time is specified with the -i command line option. The sadmind\n daemon may be started independently from the command line, for example, at\n system boot time. In this case, the -i option has no effect; sadmind continues\n to run, even if there are no active requests.",
114103+
"description": "This module exploits a buffer overflow vulnerability in adm_build_path()\n function of Sun Solstice AdminSuite sadmind daemon.\n\n The distributed system administration daemon (sadmind) is the daemon used by\n Solstice AdminSuite applications to perform distributed system administration\n operations.\n\n The sadmind daemon is started automatically by the inetd daemon whenever a\n request to invoke an operation is received. The sadmind daemon process\n continues to run for 15 minutes after the last request is completed, unless a\n different idle-time is specified with the -i command line option. The sadmind\n daemon may be started independently from the command line, for example, at\n system boot time. In this case, the -i option has no effect; sadmind continues\n to run, even if there are no active requests.",
114104114104
"references": [
114105114105
"CVE-2008-4556",
114106114106
"OSVDB-49111",
114107-
"URL-http://risesecurity.org/advisories/RISE-2008001.txt"
114107+
"URL-https://web.archive.org/web/20081201000000*/https://risesecurity.org/advisories/RISE-2008001.txt"
114108114108
],
114109114109
"platform": "Solaris",
114110114110
"arch": "x86",
@@ -114116,14 +114116,24 @@
114116114116
"Sun Solaris 9 x86",
114117114117
"Debug"
114118114118
],
114119-
"mod_time": "2020-10-02 17:38:06 +0000",
114119+
"mod_time": "2025-04-22 13:33:25 +0000",
114120114120
"path": "/modules/exploits/solaris/sunrpc/sadmind_adm_build_path.rb",
114121114121
"is_install_path": true,
114122114122
"ref_name": "solaris/sunrpc/sadmind_adm_build_path",
114123-
"check": false,
114123+
"check": true,
114124114124
"post_auth": false,
114125114125
"default_credential": false,
114126-
"notes": {},
114126+
"notes": {
114127+
"Stability": [
114128+
"crash-service-restarts"
114129+
],
114130+
"Reliability": [
114131+
"repeatable-session"
114132+
],
114133+
"SideEffects": [
114134+
"ioc-in-logs"
114135+
]
114136+
},
114127114137
"session_types": false,
114128114138
"needs_cleanup": null
114129114139
},
@@ -114140,7 +114150,7 @@
114140114150
114141114151
"midnitesnake"
114142114152
],
114143-
"description": "This exploit targets a weakness in the default security\n settings of the sadmind RPC application. This server is\n installed and enabled by default on most versions of the\n Solaris operating system.\n\n Vulnerable systems include solaris 2.7, 8, and 9",
114153+
"description": "This exploit targets a weakness in the default security settings of\n the Sun Solstice AdminSuite distributed system administration daemon\n (sadmind) RPC application. This server is installed and enabled by\n default on most versions of the Solaris operating system.\n\n Vulnerable systems include Solaris 2.7, 8, and 9.",
114144114154
"references": [
114145114155
"CVE-2003-0722",
114146114156
"OSVDB-4585",
@@ -114154,14 +114164,24 @@
114154114164
"targets": [
114155114165
"Automatic"
114156114166
],
114157-
"mod_time": "2024-01-19 13:40:43 +0000",
114167+
"mod_time": "2025-04-22 13:33:25 +0000",
114158114168
"path": "/modules/exploits/solaris/sunrpc/sadmind_exec.rb",
114159114169
"is_install_path": true,
114160114170
"ref_name": "solaris/sunrpc/sadmind_exec",
114161-
"check": false,
114171+
"check": true,
114162114172
"post_auth": false,
114163114173
"default_credential": false,
114164-
"notes": {},
114174+
"notes": {
114175+
"Stability": [
114176+
"crash-safe"
114177+
],
114178+
"Reliability": [
114179+
"repeatable-session"
114180+
],
114181+
"SideEffects": [
114182+
"ioc-in-logs"
114183+
]
114184+
},
114165114185
"session_types": false,
114166114186
"needs_cleanup": null
114167114187
},

0 commit comments

Comments
 (0)