CVE-2009-4211 – DISA STIG SRR Still Vulnerable
https://notcve.org/view.php?id=CVE-2009-4211
The U.S. Defense Information Systems Agency (DISA) Security Readiness Review (SRR) script for the Solaris x86 platform executes files in arbitrary directories as root for filenames equal to (1) java, (2) openssl, (3) php, (4) snort, (5) tshark, (6) vncserver, or (7) wireshark, which allows local users to gain privileges via a Trojan horse program. El script Security Readiness Review (SRR) de la U.S. Defense Information Systems Agency (DISA) para la plataforma Solaris x86 ejecuta ficheros como root en directorios elegidos para nombres de fichero iguales a (1) java, (2) openssl, (3) php, (4) snort, (5) tshark, (6) vncserver, o (7) wireshark, permitiendo a usuarios locales ganar privilegios mediante un programa troyano. Running DISA SRR scripts against your server can get you easily rooted. • http://securitytracker.com/id?1023265 http://www.kb.cert.org/vuls/id/433821 http://www.securityfocus.com/archive/1/508188/100/0/threaded http://www.securityfocus.com/bid/37200 • CWE-264: Permissions, Privileges, and Access Controls •