CVE-2003-0722

Solaris - Privilege Escalation

Title source: llm

Description

The default installation of sadmind on Solaris uses weak authentication (AUTH_SYS), which allows local and remote attackers to spoof Solstice AdminSuite clients and gain root privileges via a certain sequence of RPC packets.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotemultiple
https://www.exploit-db.com/exploits/16324
exploitdb WORKING POC VERIFIED
by H D Moore · perlremotesolaris
https://www.exploit-db.com/exploits/101
metasploit WORKING POC EXCELLENT
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/solaris/sunrpc/sadmind_exec.rb

Scores

EPSS 0.8710
EPSS Percentile 99.4%

Details

Status published
Products (1)
sun/solaris
Published Sep 22, 2003
Tracked Since Feb 18, 2026