module
Sun Solaris sadmind adm_build_path() Buffer Overflow
Disclosed | Created |
---|---|
10/14/2008 | 05/30/2018 |
Disclosed
10/14/2008
Created
05/30/2018
Description
This module exploits a buffer overflow vulnerability in adm_build_path()
function of Sun Solstice AdminSuite sadmind daemon.
The distributed system administration daemon (sadmind) is the daemon used by
Solstice AdminSuite applications to perform distributed system administration
operations.
The sadmind daemon is started automatically by the inetd daemon whenever a
request to invoke an operation is received. The sadmind daemon process
continues to run for 15 minutes after the last request is completed, unless a
different idle-time is specified with the -i command line option. The sadmind
daemon may be started independently from the command line, for example, at
system boot time. In this case, the -i option has no effect; sadmind continues
to run, even if there are no active requests.
function of Sun Solstice AdminSuite sadmind daemon.
The distributed system administration daemon (sadmind) is the daemon used by
Solstice AdminSuite applications to perform distributed system administration
operations.
The sadmind daemon is started automatically by the inetd daemon whenever a
request to invoke an operation is received. The sadmind daemon process
continues to run for 15 minutes after the last request is completed, unless a
different idle-time is specified with the -i command line option. The sadmind
daemon may be started independently from the command line, for example, at
system boot time. In this case, the -i option has no effect; sadmind continues
to run, even if there are no active requests.
Authors
Ramon de C Valle Adriano Lima
Platform
Solaris
Architectures
x86
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:
msf > use exploit/solaris/sunrpc/sadmind_adm_build_path msf /(h) > show actions ...actions... msf /(h) > set ACTION < action-name > msf /(h) > show options ...show and set options... msf /(h) > run

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.