CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
5.6 | $0-$5k | 0.00 |
A vulnerability, which was classified as problematic, was found in Sun Solaris (Operating System). Affected is some unknown processing of the component Event Port API. The manipulation with an unknown input leads to a race condition vulnerability. CWE is classifying the issue as CWE-362. The product contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently. This is going to have an impact on availability. CVE summarizes:
Multiple race conditions in the Solaris Event Port API in Sun Solaris 10 and OpenSolaris before snv_107 allow local users to cause a denial of service (panic) via unspecified vectors related to a race between the port_dissociate and close functions.
The weakness was shared 06/18/2009 (Website). The advisory is shared for download at sunsolve.sun.com. This vulnerability is traded as CVE-2009-2135 since 06/19/2009. The exploitability is told to be easy. The attack needs to be approached locally. The exploitation doesn't require any form of authentication. There are neither technical details nor an exploit publicly available.
It is declared as proof-of-concept.
Upgrading to version Snv 85 eliminates this vulnerability.
The vulnerability is also documented in the vulnerability database at X-Force (51284). The entries 49059 and 48685 are related to this item.
Product
Type
Vendor
Name
License
Support
- end of life
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.2VulDB Meta Temp Score: 5.6
VulDB Base Score: 6.2
VulDB Temp Score: 5.6
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Race conditionCWE: CWE-362
CAPEC: 🔍
ATT&CK: 🔍
Local: Yes
Remote: No
Availability: 🔍
Status: Proof-of-Concept
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Solaris Snv 85
Timeline
06/18/2009 🔍06/18/2009 🔍
06/19/2009 🔍
06/19/2009 🔍
06/19/2009 🔍
06/19/2009 🔍
06/19/2009 🔍
06/29/2009 🔍
03/17/2015 🔍
09/06/2019 🔍
Sources
Vendor: oracle.comAdvisory: sunsolve.sun.com⛔
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2009-2135 (🔍)
OVAL: 🔍
X-Force: 51284
SecurityTracker: 1022422
Vulnerability Center: 22709 - Sun Solaris 10 and OpenSolaris Prior to snv_107 Event Port API Local DoS Vulnerability, Medium
SecurityFocus: 35437 - Sun Solaris Event Port API Multiple Local Denial of Service Vulnerabilities
Secunia: 35279
OSVDB: 55231 - Solaris Event Port API Unspecified Race Condition Local DoS (6736713)
Vupen: ADV-2009-1634
See also: 🔍
Entry
Created: 03/17/2015 23:38Updated: 09/06/2019 19:01
Changes: 03/17/2015 23:38 (64), 09/06/2019 19:01 (8)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.