Sun Solaris /usr/sbin/wall command message spoofing

solaris-wall-message-spoofing (11608) The risk level is classified as HighHigh Risk


Sun Solaris could allow a local attacker to spoof rpc.walld messages and possibly perform malicious actions on the system, caused by a vulnerability in the wall command. The /usr/sbin/wall program is a setgid tty program that is used to send messages to all users logged onto the system. By closing stderr prior to executing /usr/bin/wall and sending a spoofed "From" header, a remote attacker could send a spoofed wall message to any user that would appear to come from a legitimate user. An attacker could use this vulnerability to possibly cause users to divulge sensitive information, such as user passwords, or perform other malicious actions.


Gain Privileges


Apply the appropriate patch for your system, as listed below. Refer to Sun Alert ID: 51980 for more information. See References.

Solaris 2.6: 114889-01 or later
Solaris 7: 114891-012 or later
Solaris 8: 114673-01 or later
Solaris 9: 114861-01 or later

Solaris 2.6: 114890-01 or later
Solaris 7: 114892-01 or later
Solaris 8: 114674-01 or later
Solaris 9: 114862-01 or later


  • BugTraq Mailing List, Fri Jan 03 2003 - 10:53:17 CST : Solaris 2.x /usr/sbin/wall Advisory .
  • Sun Alert ID: 51980: The wall(1M) Command May be Used to Send Messages Containing a Forged User ID.
  • BID-6509: Sun Solaris Wall Spoofed Message Origin Vulnerability
  • CVE-2003-1071: rpc.walld (wall daemon) for Solaris 2.6 through 9 allows local users to send messages to logged on users that appear to come from arbitrary user IDs by closing stderr before executing wall, then supplying a spoofed from header.
  • OSVDB ID: 15141: Solaris rpc.walld Local Message Spoofing
  • SA7825: Solaris spoofing vulnerability in wall
  • SECTRACK ID: 1005882: `wall` (/usr/sbin/wall) Bug Lets Local Users Spoof Broadcast Messages
  • SECTRACK ID: 1006682: (Sun Issues Fix) Re: wall (/usr/sbin/wall) Bug Lets Local Users Spoof Broadcast Messages
  • US-CERT VU#944241: rpc.walld fails to properly validate messages before broadcasting to clients

Platforms Affected:

  • Sun Solaris 2.5.1
  • Sun Solaris 2.6
  • Sun Solaris 7.0
  • Sun Solaris 8
  • Sun Solaris 9


Jan 03, 2003

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page