Solaris rpc.rwalld Remote Format String Arbitrary Code Execution
High Nessus Plugin ID 10950
SynopsisAn RPC service is running.
DescriptionThe rpc.walld RPC service is running. Some versions of this server allow an attacker to gain root access remotely, by consuming the resources of the remote host then sending a specially formed packet with format strings to this host.
Solaris 2.5.1, 2.6, 7, 8 and 9 are vulnerable to this issue. Other operating systems might be affected as well.
Nessus did not check for this vulnerability, so this might be a false positive.
SolutionDeactivate this service.