CVE-2003-0722
Solaris - Privilege Escalation
Title source: llmDescription
The default installation of sadmind on Solaris uses weak authentication (AUTH_SYS), which allows local and remote attackers to spoof Solstice AdminSuite clients and gain root privileges via a certain sequence of RPC packets.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotemultiple
https://www.exploit-db.com/exploits/16324
exploitdb
WORKING POC
VERIFIED
by H D Moore · perlremotesolaris
https://www.exploit-db.com/exploits/101
metasploit
WORKING POC
EXCELLENT
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/solaris/sunrpc/sadmind_exec.rb
References (9)
Scores
EPSS
0.8710
EPSS Percentile
99.4%
Details
Status
published
Products (1)
sun/solaris
Published
Sep 22, 2003
Tracked Since
Feb 18, 2026