CVE-2008-4131 – Sun Solaris 9/10 Text Editors - Command Execution
https://notcve.org/view.php?id=CVE-2008-4131
Multiple unspecified vulnerabilities in Sun Solaris 8 through 10 allow local users to gain privileges via vectors related to handling of tags with (1) the -t option and (2) the :tag command in the (a) vi, (b) ex, (c) vedit, (d) view, and (e) edit programs. Múltiples vulnerabilidades inespecíficas en Sun Solaris 8 a 10 permite a atacantes remotos aumentar privilegios a través de vectores relacionados con el manejo de etiquetas con la opcion (1) -t y (2) el comando :tag en los programas (a) vi, (b) ex, (c) vedit, (d) view, y (e) edit. • https://www.exploit-db.com/exploits/32393 http://secunia.com/advisories/31895 http://secunia.com/advisories/31907 http://securitytracker.com/id?1020898 http://sunsolve.sun.com/search/document.do?assetkey=1-26-237987-1 http://support.avaya.com/elmodocs2/security/ASA-2008-387.htm http://www.securityfocus.com/bid/31229 http://www.vupen.com/english/advisories/2008/2614 https://exchange.xforce.ibmcloud.com/vulnerabilities/45218 https://oval.cisecurity.org/repository/search/definition/oval • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2008-3875
https://notcve.org/view.php?id=CVE-2008-3875
The kernel in Sun Solaris 8 through 10 and OpenSolaris before snv_90 allows local users to bypass chroot, zones, and the Solaris Trusted Extensions multi-level security policy, and establish a covert communication channel, via unspecified vectors involving system calls. El núcleo de Sun Solaris 8 hasta 10 y OpenSolaris anterior a snv_90, permite a usuarios locales evitar chroot, zones y la política de seguridad multi nivel de Solaris Trusted Extensions, y establecer un canal de comunicación encubierto, a través de vectores no especificados que incluyen llamadas al sistema. • http://secunia.com/advisories/31667 http://sunsolve.sun.com/search/document.do?assetkey=1-26-240706-1 http://www.securityfocus.com/bid/30880 http://www.securitytracker.com/id?1020780 http://www.vupen.com/english/advisories/2008/2460 https://exchange.xforce.ibmcloud.com/vulnerabilities/44753 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5453 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2008-0964 – Sun Solaris 10 - snoop(1M) Utility Remote Command Execution
https://notcve.org/view.php?id=CVE-2008-0964
Multiple stack-based buffer overflows in snoop on Sun Solaris 8 through 10 and OpenSolaris before snv_96, when the -o option is omitted, allow remote attackers to execute arbitrary code via a crafted SMB packet. Múltiples desbordamientos de búfer en la región stack de la memoria en Snoop en Sun Solaris versión 8 hasta 10 y OpenSolaris anterior a la versión snv_96, cuando se omite la opción -o, permiten a los atacantes remotos ejecutar código arbitrario por medio de un paquete SMB creado. • https://www.exploit-db.com/exploits/6328 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=734 http://secunia.com/advisories/31386 http://secunia.com/advisories/31535 http://sunsolve.sun.com/search/document.do?assetkey=1-26-240101-1 http://support.avaya.com/elmodocs2/security/ASA-2008-355.htm http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=766935 http://www.securityfocus.com/bid/30556 http://www.securitytracker.com/id?1020633 http://www.vupen.com • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2008-0965
https://notcve.org/view.php?id=CVE-2008-0965
Multiple format string vulnerabilities in snoop on Sun Solaris 8 through 10 and OpenSolaris before snv_96, when the -o option is omitted, allow remote attackers to execute arbitrary code via format string specifiers in an SMB packet. Múltiples vulnerabilidades de cadena de formato en snoop sobre Sun Solaris versión 8 hasta 10 y OpenSolaris anterior a la versión snv_96, cuando se omite la opción -o, permiten a los atacantes remotos ejecutar código arbitrario por medio de especificadores de cadena de formato en un paquete SMB. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=735 http://secunia.com/advisories/31386 http://secunia.com/advisories/31535 http://sunsolve.sun.com/search/document.do?assetkey=1-26-240101-1 http://support.avaya.com/elmodocs2/security/ASA-2008-355.htm http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=766935 http://www.securityfocus.com/bid/30556 http://www.securitytracker.com/id?1020633 http://www.vupen.com/english/advisories/2008/2311 https://exchang • CWE-134: Use of Externally-Controlled Format String •
CVE-2008-3426
https://notcve.org/view.php?id=CVE-2008-3426
Unspecified vulnerability in the Solaris Platform Information and Control Library daemon (picld) in Sun Solaris 8 through 10, and OpenSolaris builds snv_01 through snv_95, allows local users to cause a denial of service via unknown vectors that prevent operation of utilities such as prtdiag, prtpicl, and prtfru. Vulnerabilidad no especificada del demonio Solaris Platform Information and Control Library daemon (picld) en Sun Solaris versión 8 hasta la 10, y OpenSolaris builds versión snv_01 hasta la snv_95, permite a usuarios locales provocar una denegación de servicio a través de vectores desconocidos que impiden operaciones con utilidades como prtdiag, prtpicl, y prtfru. • http://secunia.com/advisories/31303 http://secunia.com/advisories/31501 http://sunsolve.sun.com/search/document.do?assetkey=1-26-239728-1 http://support.avaya.com/elmodocs2/security/ASA-2008-351.htm http://www.securityfocus.com/bid/30450 http://www.securitytracker.com/id?1020609 http://www.vupen.com/english/advisories/2008/2262/references https://exchange.xforce.ibmcloud.com/vulnerabilities/44117 •