Page 4 of 35 results (0.012 seconds)

CVSS: 4.9EPSS: 0%CPEs: 192EXPL: 0

Multiple unspecified vulnerabilities in the Doors subsystem in the kernel in Sun Solaris 8 through 10, and OpenSolaris before snv_94, allow local users to cause a denial of service (process hang), or possibly bypass file permissions or gain kernel-context privileges, via vectors including ones related to (1) an argument handling deadlock in a door server and (2) watchpoint problems in the door_call function. Vulnerabilidades múltiples no especificadas en el subsistema Doors en el kernel en Sun Solaris v8 hasta v10, y OpenSolaris anteriores a snv_94, permite a los usuarios locales causar una denegación de servicio (cuelgue del proceso), o posiblemente evitar los permisos del archivo o obtener privilegios kernel-context, a través de vectores incluyendo los relativos a (1) argumento que maneja deadlook en una puerta de servidor (2) problemas watchpoint en la función door_call. • http://secunia.com/advisories/34227 http://secunia.com/advisories/34375 http://sunsolve.sun.com/search/document.do?assetkey=1-21-117350-61-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-242486-1 http://support.avaya.com/elmodocs2/security/ASA-2009-095.htm http://www.securityfocus.com/bid/34081 http://www.securitytracker.com/id?1021840 http://www.vupen.com/english/advisories/2009/0673 http://www.vupen.com/english/advisories/2009/0766 • CWE-399: Resource Management Errors •

CVSS: 6.8EPSS: 1%CPEs: 221EXPL: 1

The NFS server in Sun Solaris 10, and OpenSolaris before snv_111, does not properly implement the AUTH_NONE (aka sec=none) security mode in combination with other security modes, which allows remote attackers to bypass intended access restrictions and read or modify files, as demonstrated by a combination of the AUTH_NONE and AUTH_SYS security modes. El servidor NFS en Sun Solaris 10 y Opensolaris anterios a svn_111, no implementa adecuadamente el modo de seguridad AUTH_NONE (también conocido como sec=none) en combinación con otros modos de seguridad, lo que permite a atacantes remotos evitar las restricciones de acceso establecidas y leer o modificar archivos, como se ha demostrado mediante la combinación de modos de seguridad AUTH_NONE y AUTH_SYS. • http://osvdb.org/52559 http://secunia.com/advisories/34213 http://secunia.com/advisories/34429 http://securitytracker.com/id?1021833 http://sunsolve.sun.com/search/document.do?assetkey=1-21-139462-02-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-253588-1 http://support.avaya.com/elmodocs2/security/ASA-2009-093.htm http://www.securityfocus.com/bid/34063 http://www.vupen.com/english/advisories/2009/0658 http://www.vupen.com/english/advisories/2009/0798 https • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.9EPSS: 0%CPEs: 40EXPL: 0

The crypto pseudo device driver in Sun Solaris 10, and OpenSolaris snv_88 through snv_102, does not properly free memory, which allows local users to cause a denial of service (panic) via unspecified vectors, related to the vmem_hash_delete function. El controlador crypto pseudo en Sun Solaris v10, y OpenSolaris snv_88 hasta snv_102, no libera memoria adecuadamente, lo cual permite a usuarios locales provocar una denegación de servicio (pánico) a través de vectores no especificados, relacionado con la función vmem_hash_delete. • http://secunia.com/advisories/34149 http://secunia.com/advisories/34455 http://securitytracker.com/id?1021810 http://sunsolve.sun.com/search/document.do?assetkey=1-21-139498-04-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-254088-1 http://support.avaya.com/elmodocs2/security/ASA-2009-097.htm http://www.securityfocus.com/bid/34000 http://www.vupen.com/english/advisories/2009/0606 http://www.vupen.com/english/advisories/2009/0815 https://exchange.xforce.ibmcloud& • CWE-399: Resource Management Errors •

CVSS: 4.9EPSS: 0%CPEs: 168EXPL: 0

The IP implementation in Sun Solaris 8 through 10, and OpenSolaris before snv_82, uses an improper arena when allocating minor numbers for sockets, which allows local users to cause a denial of service (32-bit application failure and login outage) by opening a large number of sockets. La implementación IP en Sun Solaris v8 a la v10 y OpenSolaris anterior a snv_82, emplea una arena inadecuada cuando al asignar números secundarios para sockets, lo que permite a usuarios locales provocar una denegación de servicio (fallo en la aplicación 32-bit o parada de login) mediante la apertura de un gran número de sockets. • http://mail.opensolaris.org/pipermail/onnv-notify/2008-January/013262.html http://secunia.com/advisories/33751 http://securitytracker.com/id?1021653 http://sunsolve.sun.com/search/document.do?assetkey=1-21-116965-34-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-248026-1 http://support.avaya.com/elmodocs2/security/ASA-2009-042.htm http://www.securityfocus.com/bid/33550 http://www.vupen.com/english/advisories/2009/0364 https://oval.cisecurity.org/repository/search/def • CWE-189: Numeric Errors •

CVSS: 5.4EPSS: 2%CPEs: 74EXPL: 0

Unspecified vulnerability in the NFSv4 client module in the kernel on Sun Solaris 10 and OpenSolaris before snv_37, when automountd is used, allows user-assisted remote attackers to cause a denial of service (unresponsive NFS filesystems) via unknown vectors. Vulnerabilidad no especificada en el módulo del kernel del cliente NFSv4 de Sun Solaris v10 y OpenSolaris en versiones anteriores a snv_37. Cuando se utiliza automountd, permite a atacantes remotos, con la intervención del usuario, causar un ataque de denegación de servicio sobre los sistemas de archivos de tipo NFS mediante vectores de ataque desconocidos. • http://secunia.com/advisories/31517 http://securitytracker.com/id?1020716 http://sunsolve.sun.com/search/document.do?assetkey=1-26-240546-1 http://www.securityfocus.com/bid/30753 http://www.vupen.com/english/advisories/2008/2415 https://exchange.xforce.ibmcloud.com/vulnerabilities/44546 • CWE-399: Resource Management Errors •