Vulnerability Details : CVE-2008-4556
Stack-based buffer overflow in the adm_build_path function in sadmind in Sun Solstice AdminSuite on Solaris 8 and 9 allows remote attackers to execute arbitrary code via a crafted request.
Vulnerability category: OverflowExecute code
At least one public exploit which can be used to exploit this vulnerability exists!
Exploit prediction scoring system (EPSS) score for CVE-2008-4556
Probability of exploitation activity in the next 30 days: 78.89%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 98 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2008-4556
-
Sun Solaris sadmind adm_build_path() Buffer Overflow
Disclosure Date : 2008-10-14exploit/solaris/sunrpc/sadmind_adm_build_pathThis module exploits a buffer overflow vulnerability in adm_build_path() function of sadmind daemon. The distributed system administration daemon (sadmind) is the daemon used by Solstice AdminSuite applications to perform distributed system administration operations. The sadmind daemon is started automatically by the inetd daemon whenever a request to invoke an operation is received. The sadmind daemon process continues to run for 15 minutes after the last request is completed, unless a different idle-time is specified with the -i command line option. The sadmind daemon may be started independently from the command line, for example, at system boot time. In this case, the -i option has no effect; sadmind continues to run, even if there are no active requests. Authors: - Ramon de C Valle <[email protected]> - Adriano Lima <[email protected]>
CVSS scores for CVE-2008-4556
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
[email protected] |
CWE ids for CVE-2008-4556
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: [email protected] (Primary)
References for CVE-2008-4556
-
http://www.vupen.com/english/advisories/2008/2824
-
http://www.securitytracker.com/id?1021059
-
http://www.vupen.com/english/advisories/2008/3230
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/45858
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-245806-1
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5543
-
http://securityreason.com/securityalert/4408
-
http://support.avaya.com/elmodocs2/security/ASA-2008-448.htm
-
http://risesecurity.org/advisories/RISE-2008001.txt
Exploit
-
https://www.exploit-db.com/exploits/6786
-
http://www.securityfocus.com/bid/31751
Exploit
-
http://www.securityfocus.com/archive/1/497311/100/0/threaded
Products affected by CVE-2008-4556
- cpe:2.3:o:sun:solaris:9:*:sparc:*:*:*:*:*
- cpe:2.3:o:sun:solaris:9:*:x86:*:*:*:*:*
- cpe:2.3:o:sun:solaris:8:*:x86:*:*:*:*:*
- cpe:2.3:o:sun:solaris:8:*:sparc:*:*:*:*:*