// For flags

CVE-2010-4435

Multiple Vendor Calendar Manager RPC Service Remote Code Execution Vulnerability

Severity Score

10.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Unspecified vulnerability in Oracle Solaris 8, 9, and 10 allows remote attackers to affect confidentiality, integrity, and availability, related to CDE Calendar Manager Service Daemon and RPC. NOTE: the previous information was obtained from the January 2011 CPU. Oracle has not commented on claims from other software vendors that this affects other operating systems, such as HP-UX, or claims from a reliable third party that this is a buffer overflow in rpc.cmsd via long XDR-encoded ASCII strings in RPC call 10.

Una vulnerabilidad no especificada en Solaris de Oracle versiones 8, 9 y 10, permite a los atacantes remotos afectar la confidencialidad, integridad y disponibilidad, relacionadas con CDE Calendar Manager Service Daemon and RPC. NOTA: la información anterior fue obtenida de la CPU de enero de 2011. Oracle no ha comentado sobre las afirmaciones de otros proveedores de software que esto afecta a otros sistemas operativos, como HP-UX, o las afirmaciones de un tercero confiable de que se trata de un desbordamiento de búfer en el archivo rpc.cmsd por medio de cadenas ASCII largas codificadas en XDR en la llamada RPC 10.

This vulnerability allows attackers to execute arbitrary code on vulnerable installations of the Calendar Manager RPC Service. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the CMSD server (rpc.cmsd) which listens by default on UDP port 32768. The process does not properly handle large XDR-encoded ASCII strings to RPC call 10 followed by RPC call 6. This can be abused by an attacker to overflow a buffer on the remote host. Successful exploitation can result in arbitrary code execution.

*Credits: Rodrigo Rubira Branco (BSDaemon)
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2010-12-06 CVE Reserved
  • 2011-01-19 CVE Published
  • 2011-02-09 First Exploit
  • 2024-05-04 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Sun
Search vendor "Sun"
Sunos
Search vendor "Sun" for product "Sunos"
5.8
Search vendor "Sun" for product "Sunos" and version "5.8"
-
Affected
Sun
Search vendor "Sun"
Sunos
Search vendor "Sun" for product "Sunos"
5.9
Search vendor "Sun" for product "Sunos" and version "5.9"
-
Affected
Sun
Search vendor "Sun"
Sunos
Search vendor "Sun" for product "Sunos"
5.10
Search vendor "Sun" for product "Sunos" and version "5.10"
-
Affected