Oracle Solaris SunSSH PAM parse_user_name() Buffer Overflow
Posted by deepcore on December 18, 2020 – 1:55 am
This Metasploit module exploits a stack-based buffer overflow in the Solaris PAM library’s username parsing code, as used by the SunSSH daemon when the keyboard-interactive authentication method is specified. Tested against SunSSH 1.1.5 on Solaris 10u11 1/13 (x86) in VirtualBox, VMware Fusion, and VMware Player. Bare metal untested. Your addresses may vary.
Post a reply
You must be logged in to post a comment.