Vulnerability: Sun Solaris cachefs daemon

The CERT warns that a remotely exploitable vulnerability exists in Sun's NFS/RPC file system that could permit a remote attacker to execute arbitrary code with the privileges of the cachefs daemon , typically root.

Cachefsd is shipped and installed by default with Sun Solaris 2.5.1, 2.6, 7, and 8 (SPARC and Intel architectures).

For more information read the CERT advisory at http://www.cert.org/advisories/CA-2002-11.htmlFor a workaround go to http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F44309

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

More about CERT AustraliaIntel

Show Comments