Vulnerabilities > CVE-2008-1095 - Unspecified vulnerability in SUN Solaris and Sunos
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN sun
nessus
Summary
Unspecified vulnerability in the Internet Protocol (IP) implementation in Sun Solaris 8, 9, and 10 allows remote attackers to bypass intended firewall policies or cause a denial of service (panic) via unknown vectors, possibly related to ICMP packets and IP fragment reassembly.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 6 |
Nessus
NASL family Solaris Local Security Checks NASL id SOLARIS9_X86_119435.NASL description SunOS 5.9_x86: ip patch. Date this patch was last updated by Sun : Mar/05/10 last seen 2020-06-01 modified 2020-06-02 plugin id 22249 published 2006-08-21 reporter This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/22249 title Solaris 9 (x86) : 119435-29 code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text in this plugin was # extracted from the Oracle SunOS Patch Updates. # include("compat.inc"); if (description) { script_id(22249); script_version("1.48"); script_cvs_date("Date: 2019/10/25 13:36:27"); script_cve_id("CVE-2006-5073", "CVE-2007-2045", "CVE-2008-1095", "CVE-2008-1779", "CVE-2008-2121", "CVE-2009-0346", "CVE-2009-0480"); script_bugtraq_id(29089); script_xref(name:"IAVT", value:"2008-T-0014"); script_xref(name:"IAVT", value:"2008-T-0022"); script_name(english:"Solaris 9 (x86) : 119435-29"); script_summary(english:"Check for patch 119435-29"); script_set_attribute( attribute:"synopsis", value:"The remote host is missing Sun Security Patch number 119435-29" ); script_set_attribute( attribute:"description", value: "SunOS 5.9_x86: ip patch. Date this patch was last updated by Sun : Mar/05/10" ); script_set_attribute( attribute:"see_also", value:"https://getupdates.oracle.com/readme/119435-29" ); script_set_attribute( attribute:"solution", value:"You should install this patch for your system to be up-to-date." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_cwe_id(16, 189, 264, 310, 399); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:sun:solaris"); script_set_attribute(attribute:"patch_publication_date", value:"2010/03/05"); script_set_attribute(attribute:"plugin_publication_date", value:"2006/08/21"); script_set_attribute(attribute:"stig_severity", value:"I"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Solaris Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Solaris/showrev"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("solaris.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (solaris_check_patch(release:"5.9_x86", arch:"i386", patch:"119435-29", obsoleted_by:"122301-62 ", package:"SUNWcsu", version:"11.9.0,REV=2002.11.04.02.51") < 0) flag++; if (solaris_check_patch(release:"5.9_x86", arch:"i386", patch:"119435-29", obsoleted_by:"122301-62 ", package:"SUNWhea", version:"11.9.0,REV=2002.11.04.02.51") < 0) flag++; if (solaris_check_patch(release:"5.9_x86", arch:"i386", patch:"119435-29", obsoleted_by:"122301-62 ", package:"SUNWcstl", version:"11.9.0,REV=2002.11.04.02.51") < 0) flag++; if (solaris_check_patch(release:"5.9_x86", arch:"i386", patch:"119435-29", obsoleted_by:"122301-62 ", package:"SUNWcsr", version:"11.9.0,REV=2002.11.04.02.51") < 0) flag++; if (solaris_check_patch(release:"5.9_x86", arch:"i386", patch:"119435-29", obsoleted_by:"122301-62 ", package:"SUNWcsl", version:"11.9.0,REV=2002.11.04.02.51") < 0) flag++; if (solaris_check_patch(release:"5.9_x86", arch:"i386", patch:"119435-29", obsoleted_by:"122301-62 ", package:"SUNWarc", version:"11.9.0,REV=2002.11.04.02.51") < 0) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:solaris_get_report()); else security_hole(0); exit(0); } audit(AUDIT_HOST_NOT, "affected");
NASL family Solaris Local Security Checks NASL id SOLARIS9_114344.NASL description SunOS 5.9: arp, dlcosmk, ip, and ipgpc Pat. Date this patch was last updated by Sun : Mar/05/10 last seen 2020-06-01 modified 2020-06-02 plugin id 15756 published 2004-11-18 reporter This script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/15756 title Solaris 9 (sparc) : 114344-43 NASL family Solaris Local Security Checks NASL id SOLARIS10_118822.NASL description SunOS 5.10: kernel Patch. Date this patch was last updated by Sun : Feb/23/06 last seen 2018-09-02 modified 2018-08-13 plugin id 19367 published 2005-08-02 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=19367 title Solaris 10 (sparc) : 118822-30 NASL family Solaris Local Security Checks NASL id SOLARIS10_X86_118844.NASL description SunOS 5.10_x86: kernel Patch. Date this patch was last updated by Sun : Oct/28/05 This plugin has been deprecated and either replaced with individual 118844 patch-revision plugins, or deemed non-security related. last seen 2019-02-21 modified 2018-07-30 plugin id 19370 published 2005-08-02 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=19370 title Solaris 10 (x86) : 118844-20 (deprecated)
Oval
accepted | 2008-04-14T04:00:10.100-04:00 | ||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||
description | Unspecified vulnerability in the Internet Protocol (IP) implementation in Sun Solaris 8, 9, and 10 allows remote attackers to bypass intended firewall policies or cause a denial of service (panic) via unknown vectors, possibly related to ICMP packets and IP fragment reassembly. | ||||||||||||||||||||||||
family | unix | ||||||||||||||||||||||||
id | oval:org.mitre.oval:def:5511 | ||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||
submitted | 2008-03-04T08:44:56.000-05:00 | ||||||||||||||||||||||||
title | Security Vulnerability May Allow Firewall Compromise or Creation of Denial of Service (DoS) Condition | ||||||||||||||||||||||||
version | 36 |
References
- http://secunia.com/advisories/29100
- http://secunia.com/advisories/29100
- http://secunia.com/advisories/29379
- http://secunia.com/advisories/29379
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-200183-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-200183-1
- http://support.avaya.com/elmodocs2/security/ASA-2008-119.htm
- http://support.avaya.com/elmodocs2/security/ASA-2008-119.htm
- http://www.securityfocus.com/bid/27967
- http://www.securityfocus.com/bid/27967
- http://www.vupen.com/english/advisories/2008/0645
- http://www.vupen.com/english/advisories/2008/0645
- https://exchange.xforce.ibmcloud.com/vulnerabilities/40473
- https://exchange.xforce.ibmcloud.com/vulnerabilities/40473
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5511
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5511