Page 9 of 51 results (0.007 seconds)

CVSS: 5.8EPSS: 0%CPEs: 182EXPL: 0

ipnat in IP Filter in Sun Solaris 10 and OpenSolaris before snv_96, when running on a DNS server with Network Address Translation (NAT) configured, improperly changes the source port of a packet when the destination port is the DNS port, which allows remote attackers to bypass an intended CVE-2008-1447 protection mechanism and spoof the responses to DNS queries sent by named. ipnat en IP Filter de Sun Solaris v10 y OpenSolaris anteriores a snv_96, cuando se ejecutan en servidor DNS con traducción de direcciones de red (NAT) configurado cambia el puerto origen de forma incorrecta cuando el puerto destino es el puerto DNS, lo que permite a atacantes remotos evitar e intentar el mecanismo de protección CVE-2008-1447 y espíar las respuestas a solicitudes DNS enviadas por nombre. • http://secunia.com/advisories/32625 http://sunsolve.sun.com/search/document.do?assetkey=1-26-245206-1 http://www.vupen.com/english/advisories/2008/3129 https://exchange.xforce.ibmcloud.com/vulnerabilities/46721 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 10.0EPSS: 4%CPEs: 210EXPL: 1

in.dhcpd in the DHCP implementation in Sun Solaris 8 through 10, and OpenSolaris before snv_103, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via unknown DHCP requests related to the "number of offers," aka Bug ID 6713805. in.dhcpd para la implementación DHCP de Sun Solaris v8 hasta v10 y OpenSolaris anterior a snv_103; permite a atacantes remotos provocar una denegación de servicio (fallo de aserción y salida del demonio) a través de solicitudes DHCP desconocidas relacionadas con el "número de ofertas" (number of offers). También se conoce como Fallo ID 6713805. • https://www.exploit-db.com/exploits/4601 http://secunia.com/advisories/32668 http://securitytracker.com/id?1021157 http://sunsolve.sun.com/search/document.do?assetkey=1-21-109077-21-1 http://sunsolve.sun.com/search/document.do?assetkey=1-26-243806-1 http://www.securityfocus.com/bid/32213 http://www.vupen.com/english/advisories/2008/3088 https://exchange.xforce.ibmcloud.com/vulnerabilities/46480 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5668 •

CVSS: 4.7EPSS: 0%CPEs: 177EXPL: 0

Unspecified vulnerability in the UFS module in Sun Solaris 8 through 10 and OpenSolaris allows local users to cause a denial of service (NULL pointer dereference and kernel panic) via unknown vectors related to the Solaris Access Control List (ACL) implementation. Vulnerabilidad sin especificar en el módulo UFS en Sun Solaris v8 a la v10 y OpenSolaris, permite a usuarios locales provocar una denegación de servicio (puntero a referencia NULL y kernel panic) a través de vectores desconocidos relacionados con la implementación de la Lista de control de Acceso (ACL - Solaris Access Control List). • http://secunia.com/advisories/31919 http://secunia.com/advisories/32125 http://sunsolve.sun.com/search/document.do?assetkey=1-26-242267-1 http://support.avaya.com/elmodocs2/security/ASA-2008-383.htm http://www.securityfocus.com/bid/31250 http://www.securitytracker.com/id?1020899 http://www.vupen.com/english/advisories/2008/2626 https://exchange.xforce.ibmcloud.com/vulnerabilities/45236 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5639 • CWE-399: Resource Management Errors •

CVSS: 7.2EPSS: 0%CPEs: 19EXPL: 0

The kernel in Sun Solaris 8 through 10 and OpenSolaris before snv_90 allows local users to bypass chroot, zones, and the Solaris Trusted Extensions multi-level security policy, and establish a covert communication channel, via unspecified vectors involving system calls. El núcleo de Sun Solaris 8 hasta 10 y OpenSolaris anterior a snv_90, permite a usuarios locales evitar chroot, zones y la política de seguridad multi nivel de Solaris Trusted Extensions, y establecer un canal de comunicación encubierto, a través de vectores no especificados que incluyen llamadas al sistema. • http://secunia.com/advisories/31667 http://sunsolve.sun.com/search/document.do?assetkey=1-26-240706-1 http://www.securityfocus.com/bid/30880 http://www.securitytracker.com/id?1020780 http://www.vupen.com/english/advisories/2008/2460 https://exchange.xforce.ibmcloud.com/vulnerabilities/44753 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5453 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.2EPSS: 0%CPEs: 265EXPL: 0

Unspecified vulnerability in the NFS Remote Procedure Calls (RPC) zones implementation in Sun Solaris 10 and OpenSolaris before snv_88 allows local administrators of non-global zones to read and modify NFS traffic for arbitrary non-global zones, possibly leading to file modifications or a denial of service. Vulnerabilidad no especificada en el NFS Remote Procedure Calls (RPC) implementación de zonas de Sun Solaris 10 y OpenSolaris anterior a snv_88, permite a administradores locales de zonas no-globales leer y modificar el tráfico NFS para zonas no-globales de su elección, puede que conlleve modificaciones de ficheros o una denegación de servicio. • http://secunia.com/advisories/31622 http://sunsolve.sun.com/search/document.do?assetkey=1-26-240866-1 http://www.securityfocus.com/bid/30853 http://www.securitytracker.com/id?1020752 http://www.vupen.com/english/advisories/2008/2441 https://exchange.xforce.ibmcloud.com/vulnerabilities/44696 • CWE-20: Improper Input Validation •