SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


Try our Premium Alert Service
 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service





Category:   OS (UNIX)  >   Solaris Vendors:   Oracle, Sun
Solaris Bugs Lets Remote and Local Users Access and Modify Data, Remote and Local Users Deny Service, and Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1034735
SecurityTracker URL:  http://securitytracker.com/id/1034735
CVE Reference:   CVE-2015-4920, CVE-2015-4922, CVE-2016-0403, CVE-2016-0405, CVE-2016-0406, CVE-2016-0414, CVE-2016-0416, CVE-2016-0417, CVE-2016-0418, CVE-2016-0419, CVE-2016-0426, CVE-2016-0428, CVE-2016-0431, CVE-2016-0440, CVE-2016-0458, CVE-2016-0465, CVE-2016-0493, CVE-2016-0535, CVE-2016-0618   (Links to External Site)
Date:  Jan 20 2016
Impact:   Denial of service via local system, Denial of service via network, Disclosure of system information, Disclosure of user information, Modification of system information, Modification of user information, Root access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Solaris 10, 11
Description:   Multiple vulnerabilities were reported in Solaris. A remote or local user can access and modify data on the target system. A remote or local user can cause denial of service conditions on the target system. A local user can obtain root privileges on the target system.

A remote user can exploit a flaw in the Solaris NFSv4 component to cause denial of service conditions [CVE-2016-0440].

A remote user can exploit a flaw in the Solaris SMB Utilities component to cause denial of service conditions [CVE-2016-0403].

A local user can exploit a flaw in the Solaris Kernel Zones component to gain elevated privileges [CVE-2016-0414].

A local user can exploit a flaw in the Solaris Kernel Zones component to partially access data, partially modify data, and deny service [CVE-2016-0418].

A remote user can exploit a flaw in the Solaris System Archive Utility component to partially modify data [CVE-2016-0416].

A local user can exploit a flaw in the Solaris Kernel Zones component to cause denial of service conditions [CVE-2016-0419].

A local user can exploit a flaw in the Solaris Verified Boot component to cause denial of service conditions [CVE-2016-0428].

A local user can exploit a flaw in the Solaris Cluster Resource Group Manager component to cause denial of service conditions [CVE-2016-0465].

A local user can exploit a flaw in the Solaris Cluster HA for MySQL component to partially access data, partially modify data, and partially deny service [CVE-2016-0417].

A remote user can exploit a flaw in the Solaris RPC component to cause partial denial of service conditions [CVE-2016-0535]. Solaris 10 and 11 are affected.

A local user can exploit a flaw in the Solaris Kernel DAX component to cause denial of service conditions [CVE-2016-0458].

A local user can exploit a flaw in the Solaris Kernel Zones component to partially access data and cause partial denial of service conditions [CVE-2016-0426].

A local user can exploit a flaw in the Solaris Kernel Cryptography component to partially modify data and cause partial denial of service conditions [CVE-2016-0493].

A local user can exploit a flaw in the Solaris Libc Library component to partially modify data and cause partial denial of service conditions [CVE-2016-0406].

A local user can exploit a flaw in the Solaris Boot component to cause partial denial of service conditions [CVE-2015-4922].

A local user can exploit a flaw in the Solaris NDMP Backup Service component to partially modify data [CVE-2015-4920].

A local user can exploit a flaw in the Solaris Cluster Manageability and Serviceability component to partially access data [CVE-2016-0405].

A local user can exploit a flaw in the Solaris Zones component to partially access data [CVE-2016-0618].

A local user can exploit a flaw in the Solaris Kernel Zones component to cause partial denial of service conditions [CVE-2016-0431].

These vulnerabilities affected Solaris 11, except as noted above.

The following researchers reported these and other Oracle product vulnerabilities:

Adam Willard of Raytheon Foreground Security; Alexey Tyurin of ERPScan; Andrea Micalizzi aka rgod (via HP's Zero Day Initiative); Anonymous (via HP's Zero Day Initiative); Brandon Vincent; Cybersecurity-upv; David Litchfield of Google;
Dmitry Janushkevich of Secunia Research; Fernando Russ of Onapsis; FortiGuard Labs of Fortinet, Inc.; Francois Goichon of Context Information Security; Igor Kopylenko of McAfee Database Security Research Team; Ivan Chalykin of ERPScan;
Jakub Palaczynski from ING Services Polska; Karthikeyan Bhargavan, Gaetan Leurent of INRIA; Lovi Yu of Salesforce.com; Luca Carettoni; Matias Mevied of Onapsis; Mike Arnold (Bruk0ut) (via HP's Zero Day Initiative); Nassim Bouali; Nicholas Lemonias of Advanced Information Security Corporation; Nikita Kelesis of ERPScan;
Peter Kostiuk of Salesforce.com; Ryan Giobbi of American Eagle Outfitters; Sergey Gorbaty of Salesforce.com; Shai Meir of McAfee Security Research; Spyridon Chatzimichail of COSMOTE - Mobile Telecommunications S.A.; Stefan Kanthak; Stephen Kost of Integrigy; Travis Emmert of Salesforce.com; and Will Dormann of CERT/CC.

Impact:   A remote user can partially access data on the target system.

A remote user can partially modify data on the target system.

A local user can cause denial of service conditions.

A remote user can cause denial of service conditions.

A local user can partially access data on the target system.

A local user can obtain root privileges on the target system.

A local user can partially modify data on the target system.

Solution:   The vendor has issued a fix as part of the January 2016 Oracle Critical Patch Update.

The vendor's advisory is available at:

http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html

Vendor URL:  www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html (Links to External Site)
Cause:   Not specified

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2018, SecurityGlobal.net LLC