Solaris Bugs Let Local Users Deny Service, Access and Modify Data, and Gain Elevated Privileges
|
SecurityTracker Alert ID: 1036407 |
SecurityTracker URL: http://securitytracker.com/id/1036407
|
CVE Reference:
CVE-2016-3453, CVE-2016-3480, CVE-2016-3497, CVE-2016-3584, CVE-2016-5452, CVE-2016-5454, CVE-2016-5469, CVE-2016-5471
(Links to External Site)
|
Date: Jul 20 2016
|
Impact:
Denial of service via local system, Disclosure of system information, Disclosure of user information, Modification of system information, Modification of user information, User access via local system
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 10, 11.3
|
Description:
Multiple vulnerabilities were reported in Solaris. A local user can cause denial of service conditions on the target system. A local user can access and modify data on the target system. A local user can obtain elevated privileges on the target system.
A local user can exploit a flaw in the Solaris Libadimalloc component to gain elevated privileges [CVE-2016-3584].
A local user can exploit a flaw in the Solaris Verified Boot component to partially modify data and cause denial of service conditions [CVE-2016-5454].
A local user can exploit a flaw in the Solaris Kernel component to cause denial of service conditions [CVE-2016-3453, CVE-2016-3497, CVE-2016-5469, CVE-2016-5471].
A local user can exploit a flaw in the Solaris Verified Boot component to access data [CVE-2016-5452].
A local user can exploit a flaw in the Solaris Cluster HA for Postgresql component to access data [CVE-2016-3480].
The following researchers reported these and other Oracle product vulnerabilities:
Accenture TVM Prague; Adam Willard of Raytheon Foreground Security; Alexander Kornbrust of Red Database Security; Alexander Mirosh of Hewlett Packard Enterprise; Alvaro Munoz of Hewlett Packard Enterprise; Alvaro Munoz of Trend Micro's Zero Day Initiative; Ben Lincoln of NCC Group; Brian Martin of Tenable Network Security; Bruno Cirone; Christian Schneider; David Litchfield of Google;
Devin Rosenbauer of Identity Works LLC; Aleksandar Nikolic of Cisco Talos; Jack Fei of FINRA; Juan Manuel Fernandez Torres of Telefonica.com; Kasper Andersen; Matias Mevied of Onapsis; Matthias Kaiser of Code White; Matthias-Christian Ott; Nicholas Lemonias of Advanced Information Security Corporation; Nicolas Collignon of synacktiv; Reno Robert; Spyridon Chatzimichail of OTE Hellenic Telecommunications Organization S.A.; Stephan Borosh of Veris Group, LLC; Stephen Kost of Integrigy;
Steven Seeley (via Beyond Security's SSD program); Sven Blumenstein of Google; Teemu Kaariainen; Ubais PK; and XOR19 of Trend Micro's Zero Day Initiative.
|
Impact:
A local user can cause denial of service conditions on the target system.
A local user can access and modify data on the target system.
A local user can obtain elevated privileges on the target system.
|
Solution:
The vendor has issued a fix as part of the July 2016 Oracle Critical Patch Update.
The vendor's advisory is available at:
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
|
Vendor URL: www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html (Links to External Site)
|
Cause:
Not specified
|
|
Message History:
None.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|