CERTA-2005-AVI-357
Vulnerability from certfr_avis - Published: 2005-09-20 - Updated: 2005-09-20
Une vulnérabilité dans Sun Solaris 10 permet à un utilisateur local du système de provoquer un déni de service.
Description
Une erreur dans le pilote tl du système d'exploitation Sun Solaris permet à un utilisateur local mal intentionné de provoquer un arrêt inopiné de la machine vulnérable.
Solution
Se référer au bulletin de sécurité de l'éditeur pour appliquer le correctif approprié (cf. Documentation).
NoneImpacted products
References
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Sun Solaris 10 pour plateformes SPARC ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Sun Solaris 10 pour plateformes x86.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nUne erreur dans le pilote tl du syst\u00e8me d\u0027exploitation Sun Solaris\npermet \u00e0 un utilisateur local mal intentionn\u00e9 de provoquer un arr\u00eat\ninopin\u00e9 de la machine vuln\u00e9rable.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour appliquer le\ncorrectif appropri\u00e9 (cf. Documentation).\n",
"cves": [],
"initial_release_date": "2005-09-20T00:00:00",
"last_revision_date": "2005-09-20T00:00:00",
"links": [],
"reference": "CERTA-2005-AVI-357",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2005-09-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 dans Sun Solaris 10 permet \u00e0 un utilisateur local du\nsyst\u00e8me de provoquer un d\u00e9ni de service.\n",
"title": "Vuln\u00e9rabilit\u00e9 de Sun Solaris",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 de Sun du 19 septembre 2005",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101899-1\u0026searchclause"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…