SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (UNIX)  >   Solaris Vendors:   Oracle, Sun
Solaris Multiple Bugs Let Remote and Local Users Access Data and Deny Service and Let Local Users Modify Data and Deny Service
SecurityTracker Alert ID:  1037048
SecurityTracker URL:  http://securitytracker.com/id/1037048
CVE Reference:   CVE-2016-5480, CVE-2016-5487, CVE-2016-5508, CVE-2016-5525, CVE-2016-5544, CVE-2016-5553, CVE-2016-5559, CVE-2016-5561, CVE-2016-5566, CVE-2016-5576, CVE-2016-5606, CVE-2016-5615   (Links to External Site)
Date:  Oct 19 2016
Impact:   Denial of service via local system, Denial of service via network, Disclosure of system information, Disclosure of user information, Modification of system information, Modification of user information, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 10, 11.3
Description:   Multiple vulnerabilities were reported in Solaris. A remote or local user can access data on the target system. A remote or local user can cause denial of service conditions on the target system. A local user can modify data on the target system. A local user can obtain elevated privileges on the target system.

A local user can exploit a flaw in the Solaris Kernel/X86 component to gain elevated privileges [CVE-2016-5544].

A local user can exploit a flaw in the Solaris Kernel Zones component to partially modify data and cause denial of service conditions [CVE-2016-5606].

A local user can exploit a flaw in the Solaris Kernel Zones component to cause denial of service conditions [CVE-2016-5576].

A remote user can exploit a flaw in the Solaris Installation component to partially access data [CVE-2016-5566].

A local user can exploit a flaw in the Solaris Files component to partially access data, partially modify data, and partially deny service [CVE-2016-5487].

A local user can exploit a flaw in the Solaris Filesystem component to cause denial of service conditions [CVE-2016-5553].

A local user can exploit a flaw in the Solaris Kernel component to modify data [CVE-2016-5559].

A local user can exploit a flaw in the Solaris Lynx component to cause partial denial of service conditions [CVE-2016-5615].

A local user can exploit a flaw in the Solaris Cluster Cluster Geo component to partially access data [CVE-2016-5508].

A local user can exploit a flaw in the Solaris Cluster Cluster check files component to partially modify data [CVE-2016-5525].

A remote user can exploit a flaw in the Solaris IKE component to cause partial denial of service conditions [CVE-2016-5561].

A local user can exploit a flaw in the Solaris Bash component to partially modify data [CVE-2016-5480].

The following researchers reported these and other Oracle product vulnerabilities:

Abhishek Singh; Alejo Popovici; Alexander Kornbrust of Red Database Security; Amichai Shulman of Imperva, Inc.; Ariel Walter Garcia; Behzad Najjarpour Jabbari, Secunia Research at Flexera Software; bo13oy of Trend Micro's Zero Day Initiative;
Cezar Santos; David Litchfield of Google; Dawid Golunski; Denis Shpektorov; Devin Rosenbauer of Identity Works LLC; Felix Wilhelm; Hunter Liu of Huawei's IT Infrastructure & Security Dept, BPIT&QM; Jackson Thuraisamy of Security Compass;
Jacob Baines - Tenable Network Security (via Trend Micro's Zero Day Initiative); Jakub Palaczynski of ING Services Polska; John Page (hyp3rlinx); Jordan Milne; Mateusz Guzik; Matias Mevied of Onapsis; Matthias Kaiser of Code White;
Michael Miller of Integrigy; Okan Basegmez of DORASEC Consulting; Pete Finnigan; Peter Moody; Rahmat Nur Fauzi; Reno Robert; Rex Dale Stevens; Sahar Sabban of Intel; Suraj Khetani of Gulf Business Machines; Sven Blumenstein of Google; Tommy DeVoss of Evolution Security; Valentin Dornauer; and Vishnu Padmakumar.

Impact:   A remote user can obtain data on the target system.

A local user can cause denial of service conditions on the target system.

A remote user can cause denial of service conditions.

A local user can obtain data on the target system.

A local user can obtain elevated privileges on the target system.

A local user can modify data on the target system.

Solution:   The vendor has issued a fix as part of the October 2016 Oracle Critical Patch Update.

The vendor's advisory is available at:

http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html

Vendor URL:  www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html (Links to External Site)
Cause:   Not specified

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC