CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
5.9 | $0-$5k | 0.00 |
A vulnerability, which was classified as problematic, was found in Sun Solaris (Operating System). This affects an unknown code block. The manipulation with an unknown input leads to a resource management vulnerability. CWE is classifying the issue as CWE-399. This is going to have an impact on availability. The summary by CVE is:
The IPv4 Forwarding feature in Sun Solaris 10 and OpenSolaris snv_47 through snv_82, with certain patches installed, allows remote attackers to cause a denial of service (panic) via unknown vectors that trigger a NULL pointer dereference.
The bug was discovered 12/15/2008. The weakness was released 12/17/2008 (Website). The advisory is shared at sunsolve.sun.com. This vulnerability is uniquely identified as CVE-2008-5661 since 12/17/2008. The exploitability is told to be difficult. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. Neither technical details nor an exploit are publicly available.
The vulnerability scanner Nessus provides a plugin with the ID 26157 (Solaris 10 (sparc) : 120011-14 (deprecated)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Solaris Local Security Checks and running in the context l.
A possible mitigation has been published even before and not after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at X-Force (47378) and Tenable (26157).
Product
Type
Vendor
Name
Version
- 10
- Snv 47
- Snv 48
- Snv 49
- Snv 50
- Snv 51
- Snv 52
- Snv 53
- Snv 54
- Snv 55
- Snv 56
- Snv 57
- Snv 58
- Snv 59
- Snv 60
- Snv 61
- Snv 62
- Snv 63
- Snv 64
- Snv 65
- Snv 66
- Snv 67
- Snv 68
- Snv 69
- Snv 70
- Snv 71
- Snv 72
- Snv 73
- Snv 74
- Snv 75
- Snv 76
- Snv 77
- Snv 78
- Snv 79
- Snv 80
- Snv 81
- Snv 82
License
Support
- end of life
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.9VulDB Meta Temp Score: 5.9
VulDB Base Score: 5.9
VulDB Temp Score: 5.9
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Resource managementCWE: CWE-399 / CWE-404
ATT&CK: Unknown
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Nessus ID: 26157
Nessus Name: Solaris 10 (sparc) : 120011-14 (deprecated)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: no mitigation knownStatus: 🔍
0-Day Time: 🔍
Timeline
09/12/2007 🔍09/25/2007 🔍
12/15/2008 🔍
12/15/2008 🔍
12/15/2008 🔍
12/16/2008 🔍
12/16/2008 🔍
12/17/2008 🔍
12/17/2008 🔍
12/17/2008 🔍
12/17/2008 🔍
03/17/2015 🔍
08/22/2019 🔍
Sources
Vendor: oracle.comAdvisory: sunsolve.sun.com⛔
Status: Confirmed
CVE: CVE-2008-5661 (🔍)
IAVM: 🔍
X-Force: 47378
SecurityTracker: 1021413
Vulnerability Center: 20254 - Sun Solaris 10 IPv4 Forwarding Vulnerability Allows Remote Attackers to Cause DoS, Medium
SecurityFocus: 32861 - Sun Solaris IPv4 Forwarding Denial of Service Vulnerability
Secunia: 33148 - Sun Solaris IPv4 Forwarding Denial of Service, Moderately Critical
OSVDB: 50828 - Sun - Solaris - IPv4 Forwarding Denial of Service Issue
Entry
Created: 03/17/2015 16:11Updated: 08/22/2019 11:40
Changes: 03/17/2015 16:11 (76), 08/22/2019 11:40 (4)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.