SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (UNIX)  >   Solaris Vendors:   Oracle, Sun
Solaris Multiple Flaws Let Remote and Local Users Deny Service, Remote and Local Users Access Data, Remote Authenticated Users Gain Elevated Privileges, and Remote Authenticated and Local Users Modify Data
SecurityTracker Alert ID:  1040702
SecurityTracker URL:  http://securitytracker.com/id/1040702
CVE Reference:   CVE-2017-17562, CVE-2018-2563, CVE-2018-2718, CVE-2018-2753, CVE-2018-2754, CVE-2018-2763, CVE-2018-2764, CVE-2018-2792, CVE-2018-2808, CVE-2018-2822, CVE-2018-2857, CVE-2018-2858, CVE-2018-2863   (Links to External Site)
Date:  Apr 18 2018
Impact:   Denial of service via local system, Denial of service via network, Disclosure of system information, Disclosure of user information, Modification of system information, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 10, 11.3
Description:   Multiple vulnerabilities were reported in Solaris. A remote or local user can cause denial of service conditions on the target system. A remote or local user can access data on the target system. A remote authenticated user can gain elevated privileges. A remote authenticated or local user can modify data on the target system.

A remote authenticated user can exploit a flaw in the Integrated Lights Out Manager (ILOM) System Management (GoAhead) component to gain elevated privileges [CVE-2017-17562].

A local user can exploit a flaw in the Solaris ZVNET Driver component to modify data and cause denial of service conditions [CVE-2018-2754].

A remote user can exploit a flaw in the Solaris Kernel component to cause denial of service conditions [CVE-2018-2764].

A remote user can exploit a flaw in the Solaris RPC component to cause denial of service conditions [CVE-2018-2718].

A local user can exploit a flaw in the Solaris Cluster Geo component to access data, partially modify data, and partially deny service [CVE-2018-2822].

A remote authenticated user can exploit a flaw in the Sun ZFS Storage Appliance Kit (AK) HTTP data path subsystems component to partially access data, partially modify data, and partially deny service [CVE-2018-2857].

A local user can exploit a flaw in the Solaris Python modules component to access and modify data [CVE-2018-2753].

A remote user can exploit a flaw in the Sun ZFS Storage Appliance Kit (AK) HTTP data path subsystems component to partially access data [CVE-2018-2858].

A local user can exploit a flaw in the Solaris Kernel component to cause denial of service conditions [CVE-2018-2808].

A remote authenticated user can exploit a flaw in the Sun ZFS Storage Appliance Kit (AK) API frameworks component to partially access data [CVE-2018-2863].

A remote authenticated user can exploit a flaw in the Solaris LDAP Library component to partially access and partially modify data [CVE-2018-2563].

A remote authenticated user can exploit a flaw in the Hardware Management Pack Ipmitool component to partially access and partially modify data [CVE-2018-2792].

A local user can exploit a flaw in the Solaris NTPD component to partially modify data [CVE-2018-2763].

Impact:   A remote user can obtain data on the target system.

A remote authenticated user can modify data on the target system.

A local user can cause denial of service conditions on the target system.

A remote user can cause denial of service conditions.

A local user can obtain data on the target system.

A local user can modify data on the target system.

A remote authenticated user can gain elevated privileges on the target system.

Solution:   The vendor has issued a fix as part of the April 2018 Critical Patch Update.

The vendor advisory is available at:

http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html

Vendor URL:  www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html (Links to External Site)
Cause:   Not specified

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC