CVE-2007-0882 – Solaris 10/11 Telnet - Remote Authentication Bypass
https://notcve.org/view.php?id=CVE-2007-0882
Argument injection vulnerability in the telnet daemon (in.telnetd) in Solaris 10 and 11 (SunOS 5.10 and 5.11) misinterprets certain client "-f" sequences as valid requests for the login program to skip authentication, which allows remote attackers to log into certain accounts, as demonstrated by the bin account. La vulnerabilidad de inyección argumentos en el demonio telnet (in.telnetd) en Solaris versiones 10 y 11 (SunOS versiones 5.10 y 5.11) interpreta erróneamente ciertas secuencias "-f" del cliente como peticiones válidas para que el programa de inicio de sesión omita la autenticación, lo que permite a los atacantes remotos iniciar sesión en ciertas cuentas, como fue demostrado por la cuenta bin. • https://www.exploit-db.com/exploits/9918 https://www.exploit-db.com/exploits/16328 https://www.exploit-db.com/exploits/3293 http://erratasec.blogspot.com/2007/02/trivial-remote-solaris-0day-disable.html http://isc.sans.org/diary.html?storyid=2220 http://osvdb.org/31881 http://seclists.org/fulldisclosure/2007/Feb/0217.html http://secunia.com/advisories/24120 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102802-1 http://www.kb.cert.org/vuls/id/881872 ht • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •
CVE-2007-0668
https://notcve.org/view.php?id=CVE-2007-0668
The Loopback Filesystem (LOFS) in Sun Solaris 10 allows local users in a non-global zone to move and rename files in a read-only filesystem, which could lead to a denial of service. El sistema de ficheros de bucle invertido (Loopback Filesystem o LOFS) en Sun Solaris 10 permite a usuarios locales en una zona no global mover y renombrar archivos en un sistema de ficheros de sólo lectura, lo cual podría llevar a una denegación de servicio. • http://osvdb.org/31879 http://secunia.com/advisories/23996 http://securitytracker.com/id?1017582 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102699-1 http://www.securityfocus.com/bid/22364 http://www.vupen.com/english/advisories/2007/0462 https://exchange.xforce.ibmcloud.com/vulnerabilities/32140 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1372 •
CVE-2007-0634 – Sun Solaris 10 - ICMP Remote Denial of Service
https://notcve.org/view.php?id=CVE-2007-0634
Unspecified vulnerability in Sun Solaris 10 before 20070130 allows remote attackers to cause a denial of service (system crash) via certain ICMP packets. Vulnerabilidad no especificada en Sun Solaris 10 versiones anteriores a 20070130 permite a atacantes remotos provocar una denegación de servicio (caída de sistema) mediante paquetes ICMP concretos. • https://www.exploit-db.com/exploits/29540 https://www.exploit-db.com/exploits/4881 http://osvdb.org/31878 http://secunia.com/advisories/23982 http://securitytracker.com/id?1017574 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102697-1 http://www.kb.cert.org/vuls/id/967236 http://www.securityfocus.com/bid/22323 http://www.vupen.com/english/advisories/2007/0420 https://exchange.xforce.ibmcloud.com/vulnerabilities/32010 https://oval.cisecurity.org/repository/ •
CVE-2007-0470
https://notcve.org/view.php?id=CVE-2007-0470
Multiple unspecified vulnerabilities in tip in Sun Solaris 8, 9, and 10 allow local users to gain uucp account privileges via unspecified vectors. Múltiples vulnerabilidades no especificadas en tip de Sun Solaris 8, 9, y 10 permite a usuarios locales obtener privilegios de cuentas uucp mediante vectores no especificados. • http://osvdb.org/31616 http://secunia.com/advisories/23821 http://securitytracker.com/id?1017546 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102773-1 http://www.securityfocus.com/bid/22190 http://www.vupen.com/english/advisories/2007/0317 https://exchange.xforce.ibmcloud.com/vulnerabilities/31669 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2038 •
CVE-2006-6494
https://notcve.org/view.php?id=CVE-2006-6494
Directory traversal vulnerability in ld.so.1 in Sun Solaris 8, 9, and 10 allows local users to execute arbitrary code via a .. (dot dot) sequence in the LANG environment variable that points to a locale file containing attacker-controlled format string specifiers. Vulnerabilidad de escalado de directorio en ld.so.1 del Sun Solaris 8, 9 y 10 permite a usuarios locales ejecutar código de su elección a través de la secuencia .. (punto punto) en la variable de entorno LANG que señala a un fichero local que contiene controles de ataque en un formato de cadena específico. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=449 http://secunia.com/advisories/23317 http://securitytracker.com/id?1017376 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102724-1 http://www.securityfocus.com/bid/21564 http://www.vupen.com/english/advisories/2006/4979 https://exchange.xforce.ibmcloud.com/vulnerabilities/30849 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2121 •