Vulnerability Details : CVE-2007-0882
Public exploit exists!
Argument injection vulnerability in the telnet daemon (in.telnetd) in Solaris 10 and 11 (SunOS 5.10 and 5.11) misinterprets certain client "-f" sequences as valid requests for the login program to skip authentication, which allows remote attackers to log into certain accounts, as demonstrated by the bin account.
Products affected by CVE-2007-0882
- cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*
- cpe:2.3:o:sun:sunos:5.11:*:*:*:*:*:*:*
- cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*
- cpe:2.3:o:sun:solaris:10.0:*:x86:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2007-0882
91.35%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2007-0882
-
Sun Solaris Telnet Remote Authentication Bypass Vulnerability
Disclosure Date: 2007-02-12First seen: 2020-04-26exploit/solaris/telnet/fuserThis module exploits the argument injection vulnerability in the telnet daemon (in.telnetd) of Solaris 10 and 11. Authors: - MC <mc@metasploit.com>
CVSS scores for CVE-2007-0882
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2007-0882
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2007-0882
-
http://www.securityfocus.com/archive/1/459831/100/0/threaded
-
http://www.us-cert.gov/cas/techalerts/TA07-059A.html
US Government Resource
-
http://seclists.org/fulldisclosure/2007/Feb/0217.html
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/32434
-
http://www.securityfocus.com/archive/1/459843/100/0/threaded
-
http://www.securityfocus.com/archive/1/459980/100/0/threaded
-
http://www.securityfocus.com/archive/1/459855/100/0/threaded
-
http://www.securitytracker.com/id?1017625
-
http://www.securityfocus.com/archive/1/460086/100/100/threaded
-
http://www.securityfocus.com/bid/22512
Sun Solaris Telnet Remote Authentication Bypass Vulnerability
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102802-1
-
http://isc.sans.org/diary.html?storyid=2220
-
http://www.securityfocus.com/archive/1/460103/100/100/threaded
-
http://www.kb.cert.org/vuls/id/881872
US Government Resource
-
http://www.vupen.com/english/advisories/2007/0560
Vendor Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2202
-
http://erratasec.blogspot.com/2007/02/trivial-remote-solaris-0day-disable.html
Jump to