CVE-2002-1587
https://notcve.org/view.php?id=CVE-2002-1587
The libthread library (libthread.so.1) for Solaris 2.5.1 through 8 allows local users to cause a denial of service (hang) of an application that uses libthread by causing the application to wait for a certain mutex. • http://sunsolve.sun.com/search/document.do?assetkey=1-26-46867-1 http://www.securityfocus.com/bid/6318 https://exchange.xforce.ibmcloud.com/vulnerabilities/11146 •
CVE-2002-1586
https://notcve.org/view.php?id=CVE-2002-1586
Solaris 2.5.1 through 9 allows local users to cause a denial of service (kernel panic) by setting the sd_struiowrq variable in the struioget function to null, which triggers a null dereference. • http://securitytracker.com/id?1005742 http://sunsolve.sun.com/search/document.do?assetkey=1-26-48267-1 http://www.securityfocus.com/bid/6309 https://exchange.xforce.ibmcloud.com/vulnerabilities/10769 •
CVE-2002-1585
https://notcve.org/view.php?id=CVE-2002-1585
Unknown vulnerability in Solaris 8 for Intel and Solaris 8 and 9 for SPARC allows remote attackers to cause a denial of service via certain packets that cause some network interfaces to stop responding to TCP traffic. • http://sunsolve.sun.com/search/document.do?assetkey=1-26-48601-1 http://www.securityfocus.com/bid/6147 https://exchange.xforce.ibmcloud.com/vulnerabilities/10600 •
CVE-2002-1590
https://notcve.org/view.php?id=CVE-2002-1590
The Web-Based Enterprise Management (WBEM) packages (1) SUNWwbdoc, (2) SUNWwbcou, (3) SUNWwbdev and (4) SUNWmgapp packages, when installed using Solaris 8 Update 1/01 or later, install files with world or group write permissions, which allows local users to gain root privileges or cause a denial of service. • http://sunsolve.sun.com/search/document.do?assetkey=1-26-48320-1 http://www.ciac.org/ciac/bulletins/n-010.shtml http://www.securityfocus.com/bid/6061 https://exchange.xforce.ibmcloud.com/vulnerabilities/10495 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2002-1199
https://notcve.org/view.php?id=CVE-2002-1199
The getdbm procedure in ypxfrd allows local users to read arbitrary files, and remote attackers to read databases outside /var/yp, via a directory traversal and symlink attack on the domain and map arguments. El procedimiento getdbm en ypxfrd permite a usuarios locales leer ficheros arbitrarios, y a atacantes remotos leer bases de datos fuera de /var/yp, mediante ataques de atravesamiento de directorios y de enlaces simbólicos en los argumentos de dominio y mapa. • ftp://ftp.caldera.com/pub/updates/OpenServer/CSSA-2002-SCO.40 http://marc.info/?l=bugtraq&m=103426842025029&w=2 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/47903 http://www.iss.net/security_center/static/10329.php http://www.kb.cert.org/vuls/id/538033 http://www.securityfocus.com/bid/5937 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2423 •