The Computer Emergency Response Team (Cert) has issued an alert warning administrators that a Solaris security flaw identified in November is being exploited.
Working in conjunction with the Honeynet Project, Cert said that it had recently received "credible reports of an exploit for Solaris systems" and that a vulnerability identified in Cert Advisory 31 "is being actively exploited".
The vulnerability lies in the Common Desktop Environment (CDE) graphical user interface for *nix systems. There is a remotely exploitable buffer overflow flaw in the CDE Subprocess Control Service, known as 'dtspcd', which accepts requests from clients to execute commands and launch applications remotely.
As a result, "a malicious client can manipulate data sent to dtspcd and cause a buffer overflow, potentially executing code with root privileges", Cert has warned.
Recent network traces provided by Honeynet found that one of its servers had been compromised by such an exploit. It is thought that this may be the first reported incident of this vulnerability being exploited in the wild.
Latest Tesla news: Tesla stock price tanks amid reports of 'widening probe' by SEC and claims the base Model 3 loses money
SEC 'probe' takes its toll on Tesla as new research suggests that Tesla loses $6,000 on every $35,000 Model 3
10nm Cannon Lake Core i3-8121U CPUs make a rare outing with Intel's NUC mini PC
'Notorious' Australian child hacker thought he had executed 'flawless' hack
The former employee says that Tesla fired him for bringing the accusations to management internally