This Metasploit module uses a buffer overflow in the Solaris 'login' application to bypass authentication in the telnet daemon.
1922fca1702919a985e0d03cd6e813a1ab64a1125cad7362097ca409173defa5
This exploit connects to a system's modem over dialup and exploits a buffer overflow vulnerability in it's System V derived /bin/login. The vulnerability is triggered by providing a large number of arguments.
879fb76e40bddd82af476396294fcefd3b2cf5ce2ed0dcf7a06b1239ed4be912
Remote root exploit for rlogin on Solaris/SPARC 2.5.1/2.6/7/8. This remote root exploit uses the (old) System V based /bin/login vulnerability via the rlogin attack vector, returning into the .bss section to effectively bypass the non-executable stack protection (noexec_user_stack=1 in /etc/system).
bfeb19101920045f9d6f6904868ad67701158aa7b9bc94f200fad68320b7c937