Vulnerabilities > CVE-2003-1067 - Unspecified vulnerability in SUN Solaris and Sunos
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN sun
nessus
Summary
Multiple buffer overflows in the (1) dbm_open function, as used in ndbm and dbm, and the (2) dbminit function in Solaris 2.6 through 9 allow local users to gain root privileges via long arguments to Xsun or other programs that use these functions.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 8 |
Nessus
NASL family Solaris Local Security Checks NASL id SOLARIS8_150863.NASL description Vulnerability in the Solaris component of Oracle and Sun Systems Products Suite (subcomponent: Localization (L10N)). Supported versions that are affected are 8 and 9. Easily exploitable vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution. Note: Applies only when Solaris is running on SPARC platform. last seen 2020-06-01 modified 2020-06-02 plugin id 72144 published 2014-01-27 reporter This script is Copyright (C) 2014-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/72144 title Solaris 8 (sparc) : 150863-01 code # # (C) Tenable Network Security, Inc. # # The descriptive text in this plugin was # extracted from the Oracle SunOS Patch Updates. # include("compat.inc"); if (description) { script_id(72144); script_version("1.3"); script_cvs_date("Date: 2018/07/30 15:31:32"); script_cve_id("CVE-2003-1067", "CVE-2013-1067"); script_bugtraq_id(7991); script_name(english:"Solaris 8 (sparc) : 150863-01"); script_summary(english:"Check for patch 150863-01"); script_set_attribute( attribute:"synopsis", value:"The remote host is missing Sun Security Patch number 150863-01" ); script_set_attribute( attribute:"description", value: "Vulnerability in the Solaris component of Oracle and Sun Systems Products Suite (subcomponent: Localization (L10N)). Supported versions that are affected are 8 and 9. Easily exploitable vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution. Note: Applies only when Solaris is running on SPARC platform." ); script_set_attribute( attribute:"see_also", value:"https://getupdates.oracle.com/readme/150863-01" ); script_set_attribute( attribute:"solution", value:"You should install this patch for your system to be up-to-date." ); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:sun:solaris"); script_set_attribute(attribute:"patch_publication_date", value:"2013/11/07"); script_set_attribute(attribute:"plugin_publication_date", value:"2014/01/27"); script_set_attribute(attribute:"vuln_publication_date", value:"2003/06/20"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc."); script_family(english:"Solaris Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Solaris/showrev"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("solaris.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (solaris_check_patch(release:"5.8", arch:"sparc", patch:"150863-01", obsoleted_by:"", package:"SUNWhbcp", version:"8.0,REV=1999.10.12.16.26") < 0) flag++; if (solaris_check_patch(release:"5.8", arch:"sparc", patch:"150863-01", obsoleted_by:"", package:"SUNWcbcp", version:"8.0,REV=1999.10.12.16.33") < 0) flag++; if (solaris_check_patch(release:"5.8", arch:"sparc", patch:"150863-01", obsoleted_by:"", package:"SUNWkbcp", version:"8.0,REV=1999.10.12.16.19") < 0) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:solaris_get_report()); else security_hole(0); exit(0); } audit(AUDIT_HOST_NOT, "affected");
NASL family Solaris Local Security Checks NASL id SOLARIS9_113911.NASL description Vulnerability in the Solaris component of Oracle and Sun Systems Products Suite (subcomponent: Localization (L10N)). Supported versions that are affected are 8 and 9. Easily exploitable vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution. Note: Applies only when Solaris is running on SPARC platform. last seen 2020-06-01 modified 2020-06-02 plugin id 72147 published 2014-01-27 reporter This script is Copyright (C) 2014-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/72147 title Solaris 9 (sparc) : 113911-02 code # # (C) Tenable Network Security, Inc. # # The descriptive text in this plugin was # extracted from the Oracle SunOS Patch Updates. # include("compat.inc"); if (description) { script_id(72147); script_version("1.3"); script_cvs_date("Date: 2018/07/30 15:31:32"); script_cve_id("CVE-2003-1067", "CVE-2013-1067"); script_bugtraq_id(7991); script_name(english:"Solaris 9 (sparc) : 113911-02"); script_summary(english:"Check for patch 113911-02"); script_set_attribute( attribute:"synopsis", value:"The remote host is missing Sun Security Patch number 113911-02" ); script_set_attribute( attribute:"description", value: "Vulnerability in the Solaris component of Oracle and Sun Systems Products Suite (subcomponent: Localization (L10N)). Supported versions that are affected are 8 and 9. Easily exploitable vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution. Note: Applies only when Solaris is running on SPARC platform." ); script_set_attribute( attribute:"see_also", value:"https://getupdates.oracle.com/readme/113911-02" ); script_set_attribute( attribute:"solution", value:"You should install this patch for your system to be up-to-date." ); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:sun:solaris"); script_set_attribute(attribute:"patch_publication_date", value:"2013/11/15"); script_set_attribute(attribute:"plugin_publication_date", value:"2014/01/27"); script_set_attribute(attribute:"vuln_publication_date", value:"2003/06/20"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc."); script_family(english:"Solaris Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Solaris/showrev"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("solaris.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (solaris_check_patch(release:"5.9", arch:"sparc", patch:"113911-02", obsoleted_by:"", package:"SUNWcbcp", version:"9.0,REV=2001.11.06.10.49") < 0) flag++; if (solaris_check_patch(release:"5.9", arch:"sparc", patch:"113911-02", obsoleted_by:"", package:"SUNWkbcp", version:"9.0,REV=2001.11.06.10.42") < 0) flag++; if (solaris_check_patch(release:"5.9", arch:"sparc", patch:"113911-02", obsoleted_by:"", package:"SUNWhbcp", version:"9.0,REV=2001.11.06.10.45") < 0) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:solaris_get_report()); else security_hole(0); exit(0); } audit(AUDIT_HOST_NOT, "affected");
References
- http://secunia.com/advisories/9088/
- http://secunia.com/advisories/9088/
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-55420-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-55420-1
- http://www.ciac.org/ciac/bulletins/n-108.shtml
- http://www.ciac.org/ciac/bulletins/n-108.shtml
- http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
- http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
- http://www.securityfocus.com/bid/64758
- http://www.securityfocus.com/bid/64758
- http://www.securityfocus.com/bid/7991
- http://www.securityfocus.com/bid/7991
- https://exchange.xforce.ibmcloud.com/vulnerabilities/12379
- https://exchange.xforce.ibmcloud.com/vulnerabilities/12379