Sun Solaris 7/8/9 PC NetLink 2.0 slsmgr/slsadmin Remote Code Execution
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 7.9 | $0-$5k | 0.00 |
Summary
A vulnerability was found in Sun Solaris 7/8/9 and classified as problematic. Affected by this vulnerability is the function slsmgr/slsadmin of the component PC NetLink 2.0. Executing a manipulation can lead to Remote Code Execution.
This vulnerability is handled as CVE-2005-4552. There is not any exploit available.
Applying a patch is advised to resolve this issue.
Details
A vulnerability classified as critical was found in Sun Solaris 7/8/9 (Operating System). This vulnerability affects the function slsmgr/slsadmin of the component PC NetLink 2.0. The manipulation with an unknown input leads to a remote code execution vulnerability. As an impact it is known to affect confidentiality, integrity, and availability. CVE summarizes:
The (1) slsmgr and (2) slsadmin programs in Sun Solaris PC NetLink 2.0 create temporary files insecurely, which allows local users to gain privileges.
The bug was discovered 12/23/2005. The weakness was released 12/26/2005 with Sun Microsystems Inc. (Website). The advisory is shared for download at sunsolve.sun.com. This vulnerability was named CVE-2005-4552 since 12/28/2005. The attack needs to be initiated within the local network. No form of authentication is required for a successful exploitation. There are known technical details, but no exploit is available.
It is declared as proof-of-concept. The vulnerability was handled as a non-public zero-day exploit for at least 3 days. During that time the estimated underground price was around $5k-$25k.
Applying a patch is able to eliminate this problem. The bugfix is ready for download at sunsolve.sun.com.
The vulnerability is also documented in the databases at X-Force (23851), SecurityFocus (BID 16059†), OSVDB (22044†), Secunia (SA18230†) and SecurityTracker (ID 1015409†). Entry connected to this vulnerability is available at VDB-83427. VulDB is the best source for vulnerability data and more expert information about this specific topic.
Product
Type
Vendor
Name
Version
License
Support
- end of life (old version)
Website
- Vendor: https://www.oracle.com/sun/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 8.8VulDB Meta Temp Score: 7.9
VulDB Base Score: 8.8
VulDB Temp Score: 7.9
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Remote Code ExecutionCWE: Unknown
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: Partially
Availability: 🔍
Status: Proof-of-Concept
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
0-Day Time: 🔍
Patch: sunsolve.sun.com
Timeline
12/23/2005 🔍12/23/2005 🔍
12/24/2005 🔍
12/26/2005 🔍
12/26/2005 🔍
12/26/2005 🔍
12/28/2005 🔍
12/28/2005 🔍
01/03/2006 🔍
01/08/2009 🔍
08/23/2019 🔍
Sources
Vendor: oracle.comAdvisory: sunsolve.sun.com⛔
Researcher: http://www.sun.com
Organization: Sun Microsystems Inc.
Status: Confirmed
CVE: CVE-2005-4552 (🔍)
GCVE (CVE): GCVE-0-2005-4552
GCVE (VulDB): GCVE-100-1936
OVAL: 🔍
X-Force: 23851 - Sun PC NetLink slsmgr insecure permissions, Medium Risk
SecurityFocus: 16059 - Sun Solaris PC NetLink Insecure Permissions Vulnerability
Secunia: 18230 - Sun Solaris PC NetLink Insecure File Handling Vulnerability, Less Critical
OSVDB: 22044 - Solaris PC NetLink slsadmin Symlink Arbitrary File Overwrite
SecurityTracker: 1015409
Vulnerability Center: 20407 - Sun Solaris 7-9 PC NetLink 2.0 Local Privilege Elevation and Files Overwrite, High
Vupen: ADV-2005-3083
See also: 🔍
Entry
Created: 01/03/2006 12:05Updated: 08/23/2019 11:06
Changes: 01/03/2006 12:05 (87), 08/23/2019 11:06 (1)
Complete: 🔍
Cache ID: 216::103
VulDB is the best source for vulnerability data and more expert information about this specific topic.
No comments yet. Languages: en.
Please log in to comment.