Sun Information for VU#638099

rpc.rwalld contains remotely exploitable format string vulnerability



Vendor Statement

Sun confirms that there is a format string vulnerability in rpc.rwalld(1M) which affects Solaris 2.5.1, 2.6, 7 and 8. However, this issue relies on a combination of events, including the exhaustion of system resources, which are difficult to control by a remote user in order to be exploited. Disabling rpc.rwalld(1M) in inetd.conf(4) is the recommended workaround until patches are available.

Sun is currently generating patches for this issue and will be releasing a Sun Security Bulletin once the patches are available. The bulletin will be available from:

Sun patches are available from:

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Vendor References



rpc.rwalld is installed by default on Solaris 6, 7, and 8.

If you have feedback, comments, or additional information about this vulnerability, please send us email.