| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.2 | $0-$5k | 0.00 |
Summary
A vulnerability marked as problematic has been reported in Sun Solaris 10.0. Affected by this vulnerability is an unknown functionality of the component TCP Subsystem. Performing a manipulation results in denial of service. This vulnerability is reported as CVE-2007-0914. No exploit exists. It is suggested to upgrade the affected component.
Details
A vulnerability, which was classified as problematic, was found in Sun Solaris 10.0 (Operating System). This affects an unknown code of the component TCP Subsystem. The manipulation with an unknown input leads to a denial of service vulnerability. CWE is classifying the issue as CWE-404. The product does not release or incorrectly releases a resource before it is made available for re-use. This is going to have an impact on availability. The summary by CVE is:
Race condition in the TCP subsystem for Solaris 10 allows remote attackers to cause a denial of service (system panic) via unknown vectors.
The bug was discovered 02/13/2007. The weakness was disclosed 02/14/2007 with Sun (Website). The advisory is shared at sunsolve.sun.com. This vulnerability is uniquely identified as CVE-2007-0914 since 02/13/2007. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. Neither technical details nor an exploit are publicly available.
It is declared as proof-of-concept. The vulnerability was handled as a non-public zero-day exploit for at least 743 days. During that time the estimated underground price was around $25k-$100k. The vulnerability scanner Nessus provides a plugin with the ID 24372 (Solaris 10 (sparc) : 119998-02), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Solaris Local Security Checks.
Upgrading eliminates this vulnerability. Applying a patch is able to eliminate this problem. The bugfix is ready for download at sunsolve.sun.com. The best possible mitigation is suggested to be upgrading to the latest version.
The vulnerability is also documented in the databases at X-Force (32484), Tenable (24372), SecurityFocus (BID 22550†), OSVDB (33194†) and Secunia (SA24166†). The entry VDB-2445 is pretty similar. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Product
Type
Vendor
Name
Version
License
Support
- end of life (old version)
Website
- Vendor: https://www.oracle.com/sun/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.9VulDB Meta Temp Score: 5.2
VulDB Base Score: 5.9
VulDB Temp Score: 5.2
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Denial of serviceCWE: CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Proof-of-Concept
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 24372
Nessus Name: Solaris 10 (sparc) : 119998-02
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Patch: sunsolve.sun.com
Timeline
01/31/2005 🔍02/13/2007 🔍
02/13/2007 🔍
02/13/2007 🔍
02/13/2007 🔍
02/13/2007 🔍
02/14/2007 🔍
02/14/2007 🔍
02/14/2007 🔍
02/14/2007 🔍
02/16/2007 🔍
02/18/2007 🔍
02/19/2007 🔍
07/14/2019 🔍
Sources
Vendor: oracle.comAdvisory: sunsolve.sun.com⛔
Organization: Sun
Status: Confirmed
CVE: CVE-2007-0914 (🔍)
GCVE (CVE): GCVE-0-2007-0914
GCVE (VulDB): GCVE-100-2937
OVAL: 🔍
X-Force: 32484 - Sun Solaris TCP race condition denial of service, Medium Risk
SecurityFocus: 22550 - Sun Solaris TCP Subsystem Remote Denial of Service Vulnerability
Secunia: 24166 - Sun Solaris TCP Subsystem Denial of Service, Moderately Critical
OSVDB: 33194 - Solaris TCP Subsystem Unspecified Race Condition DoS
SecurityTracker: 1017649
Vulnerability Center: 14321 - Solaris 10 TCP Subsystem Race Condition Allows for Remote DoS, High
Vupen: ADV-2007-0588
See also: 🔍
Entry
Created: 02/16/2007 15:27Updated: 07/14/2019 18:18
Changes: 02/16/2007 15:27 (93), 07/14/2019 18:18 (2)
Complete: 🔍
Cache ID: 216:A7B:103
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
No comments yet. Languages: en.
Please log in to comment.