CERTA-2007-AVI-524

Vulnerability from certfr_avis - Published: 2007-12-06 - Updated: 2007-12-06

De multiples vulnérabilités affectant Sun Solaris permettent à une personne malveillante de provoquer un déni de service.

Description

Plusieurs vulnérabilités affectant Sun Solaris permettent un déni de service en local par un individu malintentionné :

  • une vulnérabilité affectant les versions x86 en mode 64 bits permet de provoquer un dysfonctionnement de la machine via l'utilisation de Linux branded zones ;
  • des erreurs entre le pilote du protocole FCP (Fiber Chanel Protocol) et le devfs (Device File System) des architectures Sparc et x86 permettent de réaliser un déni de service.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Sun Solaris 10.

Impacted products
Vendor Product Description

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cP\u003eSun Solaris 10.\u003c/P\u003e",
  "content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s affectant Sun Solaris permettent un d\u00e9ni de\nservice en local par un individu malintentionn\u00e9 :\n\n-   une vuln\u00e9rabilit\u00e9 affectant les versions x86 en mode 64 bits permet\n    de provoquer un dysfonctionnement de la machine via l\u0027utilisation de\n    Linux branded zones ;\n-   des erreurs entre le pilote du protocole FCP (Fiber Chanel Protocol)\n    et le devfs (Device File System) des architectures Sparc et x86\n    permettent de r\u00e9aliser un d\u00e9ni de service.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2007-6225",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-6225"
    },
    {
      "name": "CVE-2207-6216",
      "url": "https://www.cve.org/CVERecord?id=CVE-2207-6216"
    }
  ],
  "initial_release_date": "2007-12-06T00:00:00",
  "last_revision_date": "2007-12-06T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Sun Solaris #102947 du 29 novembre    2007 :",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102947-1"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Sun Solaris #103153 du 30 novembre    2007 :",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103153-1"
    }
  ],
  "reference": "CERTA-2007-AVI-524",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2007-12-06T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s affectant Sun Solaris permettent \u00e0 une\npersonne malveillante de provoquer un d\u00e9ni de service.\n",
  "title": "Multiples Vuln\u00e9rabilit\u00e9s dans Sun Solaris",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletins de s\u00e9curit\u00e9 Sun",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…