CERTA-2005-AVI-357

Vulnerability from certfr_avis - Published: 2005-09-20 - Updated: 2005-09-20

Une vulnérabilité dans Sun Solaris 10 permet à un utilisateur local du système de provoquer un déni de service.

Description

Une erreur dans le pilote tl du système d'exploitation Sun Solaris permet à un utilisateur local mal intentionné de provoquer un arrêt inopiné de la machine vulnérable.

Solution

Se référer au bulletin de sécurité de l'éditeur pour appliquer le correctif approprié (cf. Documentation).

None
Impacted products
Vendor Product Description
N/A N/A Sun Solaris 10 pour plateformes SPARC ;
N/A N/A Sun Solaris 10 pour plateformes x86.
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Sun Solaris 10 pour plateformes SPARC ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Sun Solaris 10 pour plateformes x86.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nUne erreur dans le pilote tl du syst\u00e8me d\u0027exploitation Sun Solaris\npermet \u00e0 un utilisateur local mal intentionn\u00e9 de provoquer un arr\u00eat\ninopin\u00e9 de la machine vuln\u00e9rable.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour appliquer le\ncorrectif appropri\u00e9 (cf. Documentation).\n",
  "cves": [],
  "initial_release_date": "2005-09-20T00:00:00",
  "last_revision_date": "2005-09-20T00:00:00",
  "links": [],
  "reference": "CERTA-2005-AVI-357",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2005-09-20T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 dans Sun Solaris 10 permet \u00e0 un utilisateur local du\nsyst\u00e8me de provoquer un d\u00e9ni de service.\n",
  "title": "Vuln\u00e9rabilit\u00e9 de Sun Solaris",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 de Sun du 19 septembre 2005",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101899-1\u0026searchclause"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…