Vulnerabilities > CVE-1999-1587 - Local Information Disclosure vulnerability in Sun Solaris UCB/PS Command

047910
CVSS 2.1 - LOW
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
local
low complexity
sun
nessus
exploit available

Summary

/usr/ucb/ps in Sun Microsystems Solaris 8 and 9, and certain earlier releases, allows local users to view the environment variables and values of arbitrary processes via the -e option.

Vulnerable Configurations

Part Description Count
OS
Sun
2

Exploit-Db

descriptionSolaris 8/9 ps - Environment Variable Information leak. CVE-1999-1587. Local exploit for Solaris platform
idEDB-ID:40727
last seen2016-11-09
modified2006-07-26
published2006-07-26
reporterExploit-DB
sourcehttps://www.exploit-db.com/download/40727/
titleSolaris 8/9 ps - Environment Variable Information leak

Nessus

  • NASL familySolaris Local Security Checks
    NASL idSOLARIS9_X86_120239.NASL
    descriptionSunOS 5.9_x86: ps cmd patch. Date this patch was last updated by Sun : Mar/24/06
    last seen2020-06-01
    modified2020-06-02
    plugin id21173
    published2006-04-03
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/21173
    titleSolaris 9 (x86) : 120239-01
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text in this plugin was
    # extracted from the Oracle SunOS Patch Updates.
    #
    include("compat.inc");
    
    if (description)
    {
      script_id(21173);
      script_version("1.21");
      script_cvs_date("Date: 2019/10/25 13:36:23");
    
      script_cve_id("CVE-1999-1587");
    
      script_name(english:"Solaris 9 (x86) : 120239-01");
      script_summary(english:"Check for patch 120239-01");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote host is missing Sun Security Patch number 120239-01"
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "SunOS 5.9_x86: ps cmd patch.
    Date this patch was last updated by Sun : Mar/24/06"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://download.oracle.com/sunalerts/1000329.1.html"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"You should install this patch for your system to be up-to-date."
      );
      script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:sun:solaris");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2006/03/24");
      script_set_attribute(attribute:"plugin_publication_date", value:"2006/04/03");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2006-2019 Tenable Network Security, Inc.");
      script_family(english:"Solaris Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Solaris/showrev");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("solaris.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    
    if (solaris_check_patch(release:"5.9_x86", arch:"i386", patch:"120239-01", obsoleted_by:"", package:"SUNWscpu", version:"11.9.0,REV=2002.11.04.02.51") < 0) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_note(port:0, extra:solaris_get_report());
      else security_note(0);
      exit(0);
    }
    audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS9_120240.NASL
    descriptionSunOS 5.9: ps cmd patch. Date this patch was last updated by Sun : Mar/24/06
    last seen2020-06-01
    modified2020-06-02
    plugin id21172
    published2006-04-03
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/21172
    titleSolaris 9 (sparc) : 120240-01
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text in this plugin was
    # extracted from the Oracle SunOS Patch Updates.
    #
    include("compat.inc");
    
    if (description)
    {
      script_id(21172);
      script_version("1.22");
      script_cvs_date("Date: 2019/10/25 13:36:23");
    
      script_cve_id("CVE-1999-1587");
    
      script_name(english:"Solaris 9 (sparc) : 120240-01");
      script_summary(english:"Check for patch 120240-01");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote host is missing Sun Security Patch number 120240-01"
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "SunOS 5.9: ps cmd patch.
    Date this patch was last updated by Sun : Mar/24/06"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://download.oracle.com/sunalerts/1000329.1.html"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"You should install this patch for your system to be up-to-date."
      );
      script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:sun:solaris");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2006/03/24");
      script_set_attribute(attribute:"plugin_publication_date", value:"2006/04/03");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2006-2019 Tenable Network Security, Inc.");
      script_family(english:"Solaris Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Solaris/showrev");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("solaris.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    
    if (solaris_check_patch(release:"5.9", arch:"sparc", patch:"120240-01", obsoleted_by:"", package:"SUNWscpu", version:"11.9.0,REV=2002.04.06.15.27") < 0) flag++;
    if (solaris_check_patch(release:"5.9", arch:"sparc", patch:"120240-01", obsoleted_by:"", package:"SUNWscpux", version:"11.9.0,REV=2002.04.06.15.27") < 0) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_note(port:0, extra:solaris_get_report());
      else security_note(0);
      exit(0);
    }
    audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS8_X86_109024.NASL
    descriptionVulnerability in the Solaris component of Oracle and Sun Systems Products Suite (subcomponent:
    last seen2020-06-01
    modified2020-06-02
    plugin id21171
    published2006-04-03
    reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/21171
    titleSolaris 8 (x86) : 109024-08
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text in this plugin was
    # extracted from the Oracle SunOS Patch Updates.
    #
    include("compat.inc");
    
    if (description)
    {
      script_id(21171);
      script_version("1.22");
      script_cvs_date("Date: 2018/07/30 15:31:32");
    
      script_cve_id("CVE-1999-1587", "CVE-2013-5834");
      script_bugtraq_id(64843);
    
      script_name(english:"Solaris 8 (x86) : 109024-08");
      script_summary(english:"Check for patch 109024-08");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote host is missing Sun Security Patch number 109024-08"
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Vulnerability in the Solaris component of Oracle and Sun Systems
    Products Suite (subcomponent: 'ps' command line utility). The
    supported version that is affected is 8. Very difficult to exploit
    vulnerability requiring logon to Operating System. Successful attack
    of this vulnerability can result in unauthorized Operating System
    takeover including arbitrary code execution."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://getupdates.oracle.com/readme/109024-08"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"You should install this patch for your system to be up-to-date."
      );
      script_set_cvss_base_vector("CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:sun:solaris");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2014/01/06");
      script_set_attribute(attribute:"plugin_publication_date", value:"2006/04/03");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.");
      script_family(english:"Solaris Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Solaris/showrev");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("solaris.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    
    if (solaris_check_patch(release:"5.8_x86", arch:"i386", patch:"109024-08", obsoleted_by:"", package:"SUNWscpu", version:"11.8.0,REV=2000.01.08.18.17") < 0) flag++;
    if (solaris_check_patch(release:"5.8_x86", arch:"i386", patch:"109024-08", obsoleted_by:"", package:"SUNWcsu", version:"11.8.0,REV=2000.01.08.18.17") < 0) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:solaris_get_report());
      else security_warning(0);
      exit(0);
    }
    audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS8_109023.NASL
    descriptionVulnerability in the Solaris component of Oracle and Sun Systems Products Suite (subcomponent:
    last seen2020-06-01
    modified2020-06-02
    plugin id21170
    published2006-04-03
    reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/21170
    titleSolaris 8 (sparc) : 109023-08
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text in this plugin was
    # extracted from the Oracle SunOS Patch Updates.
    #
    include("compat.inc");
    
    if (description)
    {
      script_id(21170);
      script_version("1.27");
      script_cvs_date("Date: 2018/07/30 15:31:32");
    
      script_cve_id("CVE-1999-1587", "CVE-2013-5834");
      script_bugtraq_id(64843);
    
      script_name(english:"Solaris 8 (sparc) : 109023-08");
      script_summary(english:"Check for patch 109023-08");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote host is missing Sun Security Patch number 109023-08"
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Vulnerability in the Solaris component of Oracle and Sun Systems
    Products Suite (subcomponent: 'ps' command line utility). The
    supported version that is affected is 8. Very difficult to exploit
    vulnerability requiring logon to Operating System. Successful attack
    of this vulnerability can result in unauthorized Operating System
    takeover including arbitrary code execution."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://getupdates.oracle.com/readme/109023-08"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"You should install this patch for your system to be up-to-date."
      );
      script_set_cvss_base_vector("CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:sun:solaris");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2014/01/06");
      script_set_attribute(attribute:"plugin_publication_date", value:"2006/04/03");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.");
      script_family(english:"Solaris Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Solaris/showrev");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("solaris.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    
    if (solaris_check_patch(release:"5.8", arch:"sparc", patch:"109023-08", obsoleted_by:"", package:"SUNWscpu", version:"11.8.0,REV=2000.01.08.18.12") < 0) flag++;
    if (solaris_check_patch(release:"5.8", arch:"sparc", patch:"109023-08", obsoleted_by:"", package:"SUNWcsxu", version:"11.8.0,REV=2000.01.08.18.12") < 0) flag++;
    if (solaris_check_patch(release:"5.8", arch:"sparc", patch:"109023-08", obsoleted_by:"", package:"SUNWcsu", version:"11.8.0,REV=2000.01.08.18.12") < 0) flag++;
    if (solaris_check_patch(release:"5.8", arch:"sparc", patch:"109023-08", obsoleted_by:"", package:"SUNWscpux", version:"11.8.0,REV=2000.01.08.18.12") < 0) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:solaris_get_report());
      else security_warning(0);
      exit(0);
    }
    audit(AUDIT_HOST_NOT, "affected");
    

Oval

accepted2007-02-20T13:39:44.948-05:00
classvulnerability
contributors
  • nameRobert L. Hollis
    organizationThreatGuard, Inc.
  • nameNabil Ouchn
    organizationSecurity-Database
description/usr/ucb/ps in Sun Microsystems Solaris 8 and 9, and certain earlier releases, allows local users to view the environment variables and values of arbitrary processes via the -e option.
familyunix
idoval:org.mitre.oval:def:1470
statusaccepted
submitted2006-03-28T09:02:00.000-04:00
titleAlternate ps Command Information Disclosure Vulnerability
version36