|
Family: Gain root remotely --> Category: infos
rpc.walld format string Vulnerability Scan
Vulnerability Scan Summary Checks the presence of a RPC service
Detailed Explanation for this Vulnerability Test
The rpc.walld RPC service is running. Some versions of this server allow an
attacker to gain root access remotely, by consuming the resources of the
remote host then sending a specially formed packet with format strings to this
host.
Solaris 2.5.1, 2.6, 7, 8 and 9 are vulnerable to this issue.
Other operating systems might be affected as well.
*** Nessus did not check for this vulnerability, so this might be a
*** false positive
Solution : Deactivate this service.
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|