Vulnerabilities > CVE-2006-5012 - Unspecified vulnerability in SUN Solaris and Sunos
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN sun
nessus
Summary
Unspecified vulnerability in Sun Solaris 8, 9, and 10 before 20060925 allows local users to cause a denial of service (disable syslog) and prevent security messages from being logged via unspecified vectors.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 14 |
Nessus
NASL family Solaris Local Security Checks NASL id SOLARIS8_X86_117351.NASL description SunOS 5.8_x86: kernel patch. Date this patch was last updated by Sun : Mar/09/09 last seen 2020-06-01 modified 2020-06-02 plugin id 20947 published 2006-02-19 reporter This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/20947 title Solaris 8 (x86) : 117351-61 code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text in this plugin was # extracted from the Oracle SunOS Patch Updates. # include("compat.inc"); if (description) { script_id(20947); script_version("1.54"); script_cvs_date("Date: 2019/10/25 13:36:26"); script_cve_id("CVE-2006-5012", "CVE-2007-5632", "CVE-2008-1115", "CVE-2008-3875", "CVE-2008-4160", "CVE-2009-0132"); script_name(english:"Solaris 8 (x86) : 117351-61"); script_summary(english:"Check for patch 117351-61"); script_set_attribute( attribute:"synopsis", value:"The remote host is missing Sun Security Patch number 117351-61" ); script_set_attribute( attribute:"description", value: "SunOS 5.8_x86: kernel patch. Date this patch was last updated by Sun : Mar/09/09" ); script_set_attribute( attribute:"see_also", value:"https://getupdates.oracle.com/readme/117351-61" ); script_set_attribute( attribute:"solution", value:"You should install this patch for your system to be up-to-date." ); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C"); script_cwe_id(78, 189, 264, 399); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:sun:solaris"); script_set_attribute(attribute:"patch_publication_date", value:"2009/03/09"); script_set_attribute(attribute:"plugin_publication_date", value:"2006/02/19"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2006-2019 Tenable Network Security, Inc."); script_family(english:"Solaris Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Solaris/showrev"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("solaris.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (solaris_check_patch(release:"5.8_x86", arch:"i386", patch:"117351-61", obsoleted_by:"", package:"SUNWhea", version:"11.8.0,REV=2000.01.08.18.17") < 0) flag++; if (solaris_check_patch(release:"5.8_x86", arch:"i386", patch:"117351-61", obsoleted_by:"", package:"SUNWcar", version:"11.8.0,REV=2000.01.08.18.17") < 0) flag++; if (solaris_check_patch(release:"5.8_x86", arch:"i386", patch:"117351-61", obsoleted_by:"", package:"SUNWpmu", version:"11.8.0,REV=2000.01.08.18.17") < 0) flag++; if (solaris_check_patch(release:"5.8_x86", arch:"i386", patch:"117351-61", obsoleted_by:"", package:"SUNWos86r", version:"1.1.0,REV=2000.01.08.18.17") < 0) flag++; if (solaris_check_patch(release:"5.8_x86", arch:"i386", patch:"117351-61", obsoleted_by:"", package:"SUNWcsu", version:"11.8.0,REV=2000.01.08.18.17") < 0) flag++; if (solaris_check_patch(release:"5.8_x86", arch:"i386", patch:"117351-61", obsoleted_by:"", package:"SUNWmdb", version:"11.8.0,REV=2000.01.08.18.17") < 0) flag++; if (solaris_check_patch(release:"5.8_x86", arch:"i386", patch:"117351-61", obsoleted_by:"", package:"SUNWcsr", version:"11.8.0,REV=2000.01.08.18.17") < 0) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:solaris_get_report()); else security_hole(0); exit(0); } audit(AUDIT_HOST_NOT, "affected");
NASL family Solaris Local Security Checks NASL id SOLARIS9_X86_118559.NASL description SunOS 5.9_x86: Kernel Patch. Date this patch was last updated by Sun : Jan/17/07 last seen 2020-06-01 modified 2020-06-02 plugin id 19843 published 2005-10-05 reporter This script is Copyright (C) 2005-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/19843 title Solaris 9 (x86) : 118559-39 code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text in this plugin was # extracted from the Oracle SunOS Patch Updates. # include("compat.inc"); if (description) { script_id(19843); script_version("1.45"); script_cvs_date("Date: 2019/10/25 13:36:24"); script_cve_id("CVE-2006-5012"); script_name(english:"Solaris 9 (x86) : 118559-39"); script_summary(english:"Check for patch 118559-39"); script_set_attribute( attribute:"synopsis", value:"The remote host is missing Sun Security Patch number 118559-39" ); script_set_attribute( attribute:"description", value: "SunOS 5.9_x86: Kernel Patch. Date this patch was last updated by Sun : Jan/17/07" ); script_set_attribute( attribute:"see_also", value:"https://getupdates.oracle.com/readme/118559-39" ); script_set_attribute( attribute:"solution", value:"You should install this patch for your system to be up-to-date." ); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:N/I:C/A:C"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:sun:solaris"); script_set_attribute(attribute:"patch_publication_date", value:"2007/01/17"); script_set_attribute(attribute:"plugin_publication_date", value:"2005/10/05"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2005-2019 Tenable Network Security, Inc."); script_family(english:"Solaris Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Solaris/showrev"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("solaris.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (solaris_check_patch(release:"5.9_x86", arch:"i386", patch:"118559-39", obsoleted_by:"", package:"SUNWmdr", version:"11.9.0,REV=2002.11.04.02.51") < 0) flag++; if (solaris_check_patch(release:"5.9_x86", arch:"i386", patch:"118559-39", obsoleted_by:"", package:"SUNWhea", version:"11.9.0,REV=2002.11.04.02.51") < 0) flag++; if (solaris_check_patch(release:"5.9_x86", arch:"i386", patch:"118559-39", obsoleted_by:"", package:"SUNWmdu", version:"11.9.0,REV=2002.11.04.02.51") < 0) flag++; if (solaris_check_patch(release:"5.9_x86", arch:"i386", patch:"118559-39", obsoleted_by:"", package:"SUNWcar", version:"11.9.0,REV=2002.11.04.02.51") < 0) flag++; if (solaris_check_patch(release:"5.9_x86", arch:"i386", patch:"118559-39", obsoleted_by:"", package:"SUNWmdau", version:"11.9.0,REV=2003.10.17.13.30") < 0) flag++; if (solaris_check_patch(release:"5.9_x86", arch:"i386", patch:"118559-39", obsoleted_by:"", package:"SUNWrmodr", version:"11.9.0,REV=2002.10.02.19.20") < 0) flag++; if (solaris_check_patch(release:"5.9_x86", arch:"i386", patch:"118559-39", obsoleted_by:"", package:"SUNWos86r", version:"11.9.0,REV=2002.11.04.02.51") < 0) flag++; if (solaris_check_patch(release:"5.9_x86", arch:"i386", patch:"118559-39", obsoleted_by:"", package:"SUNWkvm", version:"11.9.0,REV=2002.11.04.02.51") < 0) flag++; if (solaris_check_patch(release:"5.9_x86", arch:"i386", patch:"118559-39", obsoleted_by:"", package:"SUNWcsu", version:"11.9.0,REV=2002.11.04.02.51") < 0) flag++; if (solaris_check_patch(release:"5.9_x86", arch:"i386", patch:"118559-39", obsoleted_by:"", package:"SUNWmdb", version:"11.9.0,REV=2002.11.04.02.51") < 0) flag++; if (solaris_check_patch(release:"5.9_x86", arch:"i386", patch:"118559-39", obsoleted_by:"", package:"SUNWcsr", version:"11.9.0,REV=2002.11.04.02.51") < 0) flag++; if (solaris_check_patch(release:"5.9_x86", arch:"i386", patch:"118559-39", obsoleted_by:"", package:"SUNWcsl", version:"11.9.0,REV=2002.11.04.02.51") < 0) flag++; if (solaris_check_patch(release:"5.9_x86", arch:"i386", patch:"118559-39", obsoleted_by:"", package:"SUNWmddr", version:"11.9.0,REV=2002.10.31.12.55") < 0) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:solaris_get_report()); else security_warning(0); exit(0); } audit(AUDIT_HOST_NOT, "affected");
NASL family Solaris Local Security Checks NASL id SOLARIS8_117350.NASL description SunOS 5.8: kernel patch. Date this patch was last updated by Sun : Apr/21/09 last seen 2020-06-01 modified 2020-06-02 plugin id 20945 published 2006-02-19 reporter This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/20945 title Solaris 8 (sparc) : 117350-62 code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text in this plugin was # extracted from the Oracle SunOS Patch Updates. # include("compat.inc"); if (description) { script_id(20945); script_version("1.60"); script_cvs_date("Date: 2019/10/25 13:36:26"); script_cve_id("CVE-2006-5012", "CVE-2007-5632", "CVE-2008-1115", "CVE-2008-3875", "CVE-2008-4160", "CVE-2009-0132", "CVE-2009-0874", "CVE-2009-0875"); script_name(english:"Solaris 8 (sparc) : 117350-62"); script_summary(english:"Check for patch 117350-62"); script_set_attribute( attribute:"synopsis", value:"The remote host is missing Sun Security Patch number 117350-62" ); script_set_attribute( attribute:"description", value: "SunOS 5.8: kernel patch. Date this patch was last updated by Sun : Apr/21/09" ); script_set_attribute( attribute:"see_also", value:"https://getupdates.oracle.com/readme/117350-62" ); script_set_attribute( attribute:"solution", value:"You should install this patch for your system to be up-to-date." ); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C"); script_cwe_id(78, 189, 264, 362, 399); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:sun:solaris"); script_set_attribute(attribute:"patch_publication_date", value:"2009/04/21"); script_set_attribute(attribute:"plugin_publication_date", value:"2006/02/19"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2006-2019 Tenable Network Security, Inc."); script_family(english:"Solaris Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Solaris/showrev"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("solaris.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (solaris_check_patch(release:"5.8", arch:"sparc", patch:"117350-62", obsoleted_by:"", package:"SUNWhea", version:"11.8.0,REV=2000.01.08.18.12") < 0) flag++; if (solaris_check_patch(release:"5.8", arch:"sparc", patch:"117350-62", obsoleted_by:"", package:"SUNWcar", version:"11.8.0,REV=2000.01.13.13.40") < 0) flag++; if (solaris_check_patch(release:"5.8", arch:"sparc", patch:"117350-62", obsoleted_by:"", package:"SUNWcarx", version:"11.8.0,REV=2000.01.13.13.40") < 0) flag++; if (solaris_check_patch(release:"5.8", arch:"sparc", patch:"117350-62", obsoleted_by:"", package:"FJSVhea", version:"1.0,REV=1999.12.23.19.10") < 0) flag++; if (solaris_check_patch(release:"5.8", arch:"sparc", patch:"117350-62", obsoleted_by:"", package:"SUNWmdbx", version:"11.8.0,REV=2000.01.08.18.12") < 0) flag++; if (solaris_check_patch(release:"5.8", arch:"sparc", patch:"117350-62", obsoleted_by:"", package:"SUNWpmux", version:"11.8.0,REV=2000.01.08.18.12") < 0) flag++; if (solaris_check_patch(release:"5.8", arch:"sparc", patch:"117350-62", obsoleted_by:"", package:"SUNWcsxu", version:"11.8.0,REV=2000.01.08.18.12") < 0) flag++; if (solaris_check_patch(release:"5.8", arch:"sparc", patch:"117350-62", obsoleted_by:"", package:"SUNWpmu", version:"11.8.0,REV=2000.01.08.18.12") < 0) flag++; if (solaris_check_patch(release:"5.8", arch:"sparc", patch:"117350-62", obsoleted_by:"", package:"SUNWcprx", version:"11.8.0,REV=2000.01.08.18.12") < 0) flag++; if (solaris_check_patch(release:"5.8", arch:"sparc", patch:"117350-62", obsoleted_by:"", package:"SUNWcsu", version:"11.8.0,REV=2000.01.08.18.12") < 0) flag++; if (solaris_check_patch(release:"5.8", arch:"sparc", patch:"117350-62", obsoleted_by:"", package:"SUNWmdb", version:"11.8.0,REV=2000.01.08.18.12") < 0) flag++; if (solaris_check_patch(release:"5.8", arch:"sparc", patch:"117350-62", obsoleted_by:"", package:"SUNWcsr", version:"11.8.0,REV=2000.01.08.18.12") < 0) flag++; if (solaris_check_patch(release:"5.8", arch:"sparc", patch:"117350-62", obsoleted_by:"", package:"SUNWcpr", version:"11.8.0,REV=2000.01.08.18.12") < 0) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:solaris_get_report()); else security_hole(0); exit(0); } audit(AUDIT_HOST_NOT, "affected");
NASL family Solaris Local Security Checks NASL id SOLARIS9_118558.NASL description SunOS 5.9: Kernel Patch. Date this patch was last updated by Sun : Jan/11/07 last seen 2020-06-01 modified 2020-06-02 plugin id 19841 published 2005-10-05 reporter This script is Copyright (C) 2005-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/19841 title Solaris 9 (sparc) : 118558-39
References
- http://secunia.com/advisories/22083
- http://secunia.com/advisories/22083
- http://secunia.com/advisories/22587
- http://secunia.com/advisories/22587
- http://securitytracker.com/id?1016929
- http://securitytracker.com/id?1016929
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102510-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102510-1
- http://support.avaya.com/elmodocs2/security/ASA-2006-235.htm
- http://support.avaya.com/elmodocs2/security/ASA-2006-235.htm
- http://www.securityfocus.com/bid/20211
- http://www.securityfocus.com/bid/20211
- http://www.vupen.com/english/advisories/2006/3768
- http://www.vupen.com/english/advisories/2006/3768
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29149
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29149