CVE-2009-4080
https://notcve.org/view.php?id=CVE-2009-4080
Multiple unspecified vulnerabilities in ldap_cachemgr (aka the LDAP client configuration cache daemon) in Sun Solaris 9 and 10, and OpenSolaris before snv_78, allow local users to cause a denial of service (daemon crash) via vectors involving multiple serviceSearchDescriptor attributes and a call to the getldap_lookup function, and unspecified other vectors. Múltiples vulnerabilidades no especificadas en ldap_cachemgr (también conocido como demonio de la caché del configuración del cliente LDAP= en Sun Solaris V9 y V10 y OpenSolaris anteriores a snv_79, permite a a usuarios locales provocar una denegación de servicio (caída del demonio) a través de vectores que implican múltiples atributos serviceSearchDescriptor y una llamada a la función getldap_lookup y otros vectores no específicos. • http://osvdb.org/60514 http://secunia.com/advisories/37505 http://secunia.com/advisories/37506 http://sunsolve.sun.com/search/document.do?assetkey=1-21-112960-69-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-231402-1 http://www.securityfocus.com/bid/37129 http://www.securitytracker.com/id?1023239 http://www.vupen.com/english/advisories/2009/3336 •
CVE-2009-0873
https://notcve.org/view.php?id=CVE-2009-0873
The NFS daemon (aka nfsd) in Sun Solaris 10 and OpenSolaris before snv_106, when NFSv3 is used, does not properly implement combinations of security modes, which allows remote attackers to bypass intended access restrictions and read or modify files, as demonstrated by a combination of the sec=sys and sec=krb5 security modes, related to modes that "override each other." El demonio NFS (también conocido como nfsd) en Sun Solaris 10 y OpenSolaris snv_106, cuando NFSv3 es usado, no implementa adecuadamente las combinaciones de nodos de seguridad, lo que permite a atacantes remotos evitar las restricciones de acceso intencionadas y leer o modificar archivos, como se ha demostrado a través de una combinación de los nodos de seguridad sec=sys y sec=krb5, relacionado con nodos que "sobreescriben el otro". • http://osvdb.org/52560 http://secunia.com/advisories/34225 http://secunia.com/advisories/34435 http://securitytracker.com/id?1021832 http://sunsolve.sun.com/search/document.do?assetkey=1-21-139462-02-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-250306-1 http://support.avaya.com/elmodocs2/security/ASA-2009-096.htm http://www.securityfocus.com/bid/34062 http://www.vupen.com/english/advisories/2009/0657 http://www.vupen.com/english/advisories/2009/0814 https • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2009-0838
https://notcve.org/view.php?id=CVE-2009-0838
The crypto pseudo device driver in Sun Solaris 10, and OpenSolaris snv_88 through snv_102, does not properly free memory, which allows local users to cause a denial of service (panic) via unspecified vectors, related to the vmem_hash_delete function. El controlador crypto pseudo en Sun Solaris v10, y OpenSolaris snv_88 hasta snv_102, no libera memoria adecuadamente, lo cual permite a usuarios locales provocar una denegación de servicio (pánico) a través de vectores no especificados, relacionado con la función vmem_hash_delete. • http://secunia.com/advisories/34149 http://secunia.com/advisories/34455 http://securitytracker.com/id?1021810 http://sunsolve.sun.com/search/document.do?assetkey=1-21-139498-04-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-254088-1 http://support.avaya.com/elmodocs2/security/ASA-2009-097.htm http://www.securityfocus.com/bid/34000 http://www.vupen.com/english/advisories/2009/0606 http://www.vupen.com/english/advisories/2009/0815 https://exchange.xforce.ibmcloud& • CWE-399: Resource Management Errors •
CVE-2008-5550
https://notcve.org/view.php?id=CVE-2008-5550
Open redirect vulnerability in console/faces/jsp/login/BeginLogin.jsp in Sun Java Web Console 3.0.2 through 3.0.5 and Solaris 10 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the redirect_url parameter. Vulnerabilidad involuntaria de redirección en console/faces/jsp/login/BeginLogin.jsp en Sun Java Web Console v3.0.2 a v3.0.5 y Solaris 10 permite a atacantes remotos redirigir a los usuarios a sitios web de su elección y realizar ataques de phising a través del parámetro redirect_url. • http://sunsolve.sun.com/search/document.do?assetkey=1-21-125950-18-1 http://sunsolve.sun.com/search/document.do?assetkey=1-21-125952-18-1 http://sunsolve.sun.com/search/document.do?assetkey=1-21-136987-02-1 http://sunsolve.sun.com/search/document.do?assetkey=1-26-243786-1 http://www.securityfocus.com/bid/32771 https://exchange.xforce.ibmcloud.com/vulnerabilities/47257 •
CVE-2008-5009
https://notcve.org/view.php?id=CVE-2008-5009
Race condition in the s_xout kernel module in Sun Solstice X.25 9.2, when running on a multiple CPU machine, allows local users to cause a denial of service (panic) via vectors involving reading the /dev/xty file. Condición de carrera en el módulo del kernel s_xout en Sun Solstice X.25 9.2, cuando se ejecuta en una máquina con múltiples CPUs, permite a usuarios locales provocar una denegación de servicio (pánico) mediante vectores que involucran la lectura del archivo /dev/xty. • http://secunia.com/advisories/32667 http://securitytracker.com/id?1021156 http://sunsolve.sun.com/search/document.do?assetkey=1-21-108669-21-1 http://sunsolve.sun.com/search/document.do?assetkey=1-21-108670-21-1 http://sunsolve.sun.com/search/document.do?assetkey=1-26-243106-1 http://www.securityfocus.com/bid/32215 http://www.vupen.com/english/advisories/2008/3087 https://exchange.xforce.ibmcloud.com/vulnerabilities/46466 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •