{"id": "EDB-ID:22231", "vendorId": null, "type": "exploitdb", "bulletinFamily": "exploit", "title": "HPUX 10.20/11 Wall Message - Local Buffer Overflow", "description": "", "published": "2003-02-07T00:00:00", "modified": "2003-02-07T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "https://www.exploit-db.com/exploits/22231", "reporter": "Scotty", "references": [], "cvelist": ["2003-1375"], "immutableFields": [], "lastseen": "2022-08-16T08:57:24", "viewCount": 13, "enchantments": {"dependencies": {}, "score": {"value": 0.6, "vector": "NONE"}, "backreferences": {}, "exploitation": null, "vulnersScore": 0.6}, "_state": {"dependencies": 1661182887, "score": 1661184847, "epss": 1678800746}, "_internal": {"score_hash": "e82d5f97862c4089f6e0932e9bc7f790"}, "sourceHref": "https://www.exploit-db.com/download/22231", "sourceData": "source: https://www.securityfocus.com/bid/6800/info\r\n\r\nIt has been reported that the HPUX wall executable may be prone to a buffer overflow condition. This buffer overflow is alleged to be triggered when an excessive amount of data is redirected into wall as a message intended to be broadcast.\r\n\r\nIt may be possible for remote attackers to corrupt sensitive regions of memory with attacker-supplied values, possibly resulting in execution of arbitrary code.\r\n\r\nperl -e 'print \"A\" x 9000' > /tmp/out\r\n/usr/sbin/wall /tmp/out", "osvdbidlist": ["60333"], "exploitType": "local", "verified": true}