Vulnerability Details : CVE-2001-1583
Public exploit exists!
lpd daemon (in.lpd) in Solaris 8 and earlier allows remote attackers to execute arbitrary commands via a job request with a crafted control file that is not properly handled when lpd invokes a mail program. NOTE: this might be the same vulnerability as CVE-2000-1220.
Threat overview for CVE-2001-1583
Top countries where our scanners detected CVE-2001-1583
Top open port discovered on systems with this issue
21
IPs affected by CVE-2001-1583 8
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2001-1583!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2001-1583
Probability of exploitation activity in the next 30 days: 22.55%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 96 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2001-1583
-
Solaris LPD Command Execution
Disclosure Date: 2001-08-31First seen: 2020-04-26exploit/solaris/lpd/sendmail_execThis module exploits an arbitrary command execution flaw in the in.lpd service shipped with all versions of Sun Solaris up to and including 8.0. This module uses a technique discovered by Dino Dai Zovi to exploit the flaw without needing to know the resolve
CVSS scores for CVE-2001-1583
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2001-1583
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2001-1583
-
http://www.securityfocus.com/bid/3274
Solaris lpd Remote Command Execution VulnerabilityExploit;Third Party Advisory;VDB Entry
-
http://marc.info/?l=bugtraq&m=99929694701826&w=2
Mailing List;Third Party Advisory
-
http://www.derkeiler.com/Mailing-Lists/securityfocus/incidents/2001-08/0490.html
Broken Link
-
http://metasploit.com/projects/Framework/modules/exploits/solaris_lpd_exec.pm
Broken Link
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/7087
Third Party Advisory;VDB Entry
Products affected by CVE-2001-1583
- cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*