SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (UNIX)  >   TCP/IP Stack Implementation Vendors:   Sun
Solaris IP Stack Fragment Processing Bug Lets Remote Users Degrade Performance
SecurityTracker Alert ID:  1017911
SecurityTracker URL:  http://securitytracker.com/id/1017911
CVE Reference:   CVE-2007-2045   (Links to External Site)
Updated:  Sep 21 2007
Original Entry Date:  Apr 13 2007
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Solaris 8, 9
Description:   A vulnerability was reported in Solaris. A remote user can cause denial of service conditions.

The system does not properly process IP fragments. A remote user can send specially crafted IP packets to degrade performance on the target system.

Solaris 8 and 9 are affected.

Solaris 10 is not affected.

Impact:   A remote user can cause performance degradation on the target system.
Solution:   On April 12, 2007, Sun issued patches, but withdrew the patches on August 2, 2007 due to connectivity and network performance issues with the patches. The Sun advisory describing the problem with the patches is available at:

http://sunsolve.sun.com/search/document.do?assetkey=1-26-103023-1

On September 18, 2007, Sun issued the following (new) fixes.

SPARC Platform

* Solaris 9 with patch 114344-29 or later

x86 Platform

* Solaris 9 with patch 119435-18 or later

A final resolution for Solaris 8 is pending completion.

The original Sun advisory is available at:

http://sunsolve.sun.com/search/document.do?assetkey=1-26-102866-1

Vendor URL:  sunsolve.sun.com/search/document.do?assetkey=1-26-102866-1 (Links to External Site)
Cause:   State error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC