search menu icon-carat-right cmu-wordmark

CERT Coordination Center

rpc.walld fails to properly validate messages before broadcasting to clients

Vulnerability Note VU#944241

Original Release Date: 2003-04-30 | Last Revised: 2003-10-21

Overview

A vulnerability in rpc.walld may allow local users to forge wall messages. An exploit exists for this vulnerability and is publically available.

Description

From the rpc.walld man page:

The wall command reads the named file, or, if no filename appears, it reads the standard input until an end-of-file. It then sends this message to all currently logged-in users preceded by:
Broadcast Message from source . . .
The command is used to warn all users, typically before shutting down the system.
A vulnerability in rpc.walld may allow local attackers to forge wall messages, which may enable them to trick victims into divulging sensitive information such as user credentials. For more detailed information, please see the following documents.

Impact

This vulnerability may allow local attackers to forge wall messages, which may enable them to trick victims into divulging sensitive information such as user credentials.

Solution

Apply a patch from your vendor.

Vendor Information

944241
 

View all 56 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was discovered by Brant Roman.

This document was written by Ian A Finlay.

Other Information

CVE IDs: None
Severity Metric: 2.81
Date Public: 2003-01-03
Date First Published: 2003-04-30
Date Last Updated: 2003-10-21 21:28 UTC
Document Revision: 8

Sponsored by CISA.