Full title: Oracle Solaris SunSSH PAM parse_user_name() Buffer Overflow Exploit Category: remote exploits Platform: solaris This Metasploit module exploits a stack-based buffer overflow in the Solaris PAM library's username parsing code, as used by the SunSSH daemon when the keyboard-interactive authentication method is specified. Tested against SunSSH 1.1.5 on Solaris 10u11 1/13 (x86) in VirtualBox, VMware Fusion, and VMware Player. Bare metal untested. Your addresses may vary. # 0day.today @ http://0day.today/