SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (UNIX)  >   Solaris Vendors:   Sun
Solaris IP Tunnel Parameter Processing Bug Lets Local Users Gain Root Privileges
SecurityTracker Alert ID:  1021464
SecurityTracker URL:  http://securitytracker.com/id/1021464
CVE Reference:   CVE-2008-5689   (Links to External Site)
Updated:  Feb 9 2009
Original Entry Date:  Dec 18 2008
Impact:   Denial of service via local system, Execution of arbitrary code via local system, Root access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 10, OpenSolaris
Description:   A vulnerability was reported in Solaris. A local user can obtain root privileges on the target system. A local user can cause denial of service conditions.

A local user can send a specially crafted IOCTL request to trigger a null pointer dereference and execute arbitrary commands on the target system with root privileges.

A local user can also exploit this to cause a system panic.

The vulnerability resides in the tun(7M) IP tunnel parameter processing.

The vendor was notified on September 4, 2007.

Tobias Klein reported this vulnerability.

The original advisory is available at:

http://www.trapkit.de/advisories/TKADV2008-015.txt

Impact:   A local user can obtain root privileges on the target system.

A local user can cause a kernel panic.

Solution:   The vendor has issued the following fixes.

SPARC Platform

* Solaris 10 with patch 138888-01 or later
* OpenSolaris based upon builds snv_77 or later

x86 Platform

* Solaris 10 with patch 138889-01 or later
* OpenSolaris based upon builds snv_77 or later

The vendor's advisory is available at:

http://sunsolve.sun.com/search/document.do?assetkey=1-66-242266-1

Vendor URL:  sunsolve.sun.com/search/document.do?assetkey=1-66-242266-1 (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC