Oracle Netra Sparc T3-1b Integrated Lights Out Manager Remote Code Execution
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 7.3 | $0-$5k | 0.00 |
Summary
A vulnerability categorized as critical has been discovered in Oracle Netra Sparc T3-1b. Impacted is an unknown function of the component Integrated Lights Out Manager. Such manipulation leads to Remote Code Execution. This vulnerability is uniquely identified as CVE-2011-2307. No exploit exists.
Details
A vulnerability, which was classified as critical, has been found in Oracle Netra Sparc T3-1b (affected version unknown). Affected by this issue is an unknown functionality of the component Integrated Lights Out Manager. The manipulation with an unknown input leads to a remote code execution vulnerability. Impacted is confidentiality, integrity, and availability. CVE summarizes:
Unspecified vulnerability in Oracle SysFW 8.1.0.a in various Oracle SPARC T3, Netra SPARC T3, Sun Fire, and Sun Blade servers allows remote attackers to affect confidentiality, integrity, and availability, related to Sun Integrated Lights Out Manager (ILOM).
The weakness was disclosed 07/20/2011 with Oracle (Website). The advisory is shared for download at us-cert.gov. This vulnerability is handled as CVE-2011-2307. The exploitation is known to be easy. The attack may be launched remotely. No form of authentication is required for exploitation. There are neither technical details nor an exploit publicly available. The current price for an exploit might be approx. USD $0-$5k (estimation calculated on 11/15/2021).
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
The vulnerability is also documented in the databases at SecurityFocus (BID 48765†) and Vulnerability Center (SBV-32331†). The entries VDB-53257, VDB-58051, VDB-58050 and VDB-58049 are pretty similar. Once again VulDB remains the best source for vulnerability data.
Product
Vendor
Name
License
Website
- Vendor: https://www.oracle.com
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.3VulDB Meta Temp Score: 7.3
VulDB Base Score: 7.3
VulDB Temp Score: 7.3
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Remote Code ExecutionCWE: Unknown
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: no mitigation knownStatus: 🔍
0-Day Time: 🔍
Timeline
06/02/2011 🔍07/19/2011 🔍
07/20/2011 🔍
07/20/2011 🔍
07/20/2011 🔍
03/23/2015 🔍
11/15/2021 🔍
Sources
Vendor: oracle.comAdvisory: us-cert.gov
Organization: Oracle
Status: Not defined
Confirmation: 🔍
CVE: CVE-2011-2307 (🔍)
GCVE (CVE): GCVE-0-2011-2307
GCVE (VulDB): GCVE-100-58052
SecurityFocus: 48765 - Oracle Sun SPARC T3/Netra T3/Fire/Blade Server Series CVE-2011-2307 Remote Vulnerability
Vulnerability Center: 32331 - [cpujuly2011-313328] Oracle Sun SysFW, SPARC T3, SPARC Netra T3, Fire and Blade ILOM Unspecified Remote Vulnerability, High
See also: 🔍
Entry
Created: 03/23/2015 16:50Updated: 11/15/2021 09:11
Changes: 03/23/2015 16:50 (44), 03/27/2017 18:07 (9), 11/15/2021 09:11 (4)
Complete: 🔍
Cache ID: 216:6B5:103
Once again VulDB remains the best source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.