Vulnerabilities > CVE-2008-1779 - Resource Management Errors vulnerability in SUN Solaris 10/8/9
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Sun Solaris 8, 9, and 10 allows "remote privileged" users to cause a denial of service (panic) via unknown vectors related to self encapsulated IP packets.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 6 |
Common Weakness Enumeration (CWE)
Nessus
NASL family Solaris Local Security Checks NASL id SOLARIS9_X86_119435.NASL description SunOS 5.9_x86: ip patch. Date this patch was last updated by Sun : Mar/05/10 last seen 2020-06-01 modified 2020-06-02 plugin id 22249 published 2006-08-21 reporter This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/22249 title Solaris 9 (x86) : 119435-29 code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text in this plugin was # extracted from the Oracle SunOS Patch Updates. # include("compat.inc"); if (description) { script_id(22249); script_version("1.48"); script_cvs_date("Date: 2019/10/25 13:36:27"); script_cve_id("CVE-2006-5073", "CVE-2007-2045", "CVE-2008-1095", "CVE-2008-1779", "CVE-2008-2121", "CVE-2009-0346", "CVE-2009-0480"); script_bugtraq_id(29089); script_xref(name:"IAVT", value:"2008-T-0014"); script_xref(name:"IAVT", value:"2008-T-0022"); script_name(english:"Solaris 9 (x86) : 119435-29"); script_summary(english:"Check for patch 119435-29"); script_set_attribute( attribute:"synopsis", value:"The remote host is missing Sun Security Patch number 119435-29" ); script_set_attribute( attribute:"description", value: "SunOS 5.9_x86: ip patch. Date this patch was last updated by Sun : Mar/05/10" ); script_set_attribute( attribute:"see_also", value:"https://getupdates.oracle.com/readme/119435-29" ); script_set_attribute( attribute:"solution", value:"You should install this patch for your system to be up-to-date." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_cwe_id(16, 189, 264, 310, 399); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:sun:solaris"); script_set_attribute(attribute:"patch_publication_date", value:"2010/03/05"); script_set_attribute(attribute:"plugin_publication_date", value:"2006/08/21"); script_set_attribute(attribute:"stig_severity", value:"I"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Solaris Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Solaris/showrev"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("solaris.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (solaris_check_patch(release:"5.9_x86", arch:"i386", patch:"119435-29", obsoleted_by:"122301-62 ", package:"SUNWcsu", version:"11.9.0,REV=2002.11.04.02.51") < 0) flag++; if (solaris_check_patch(release:"5.9_x86", arch:"i386", patch:"119435-29", obsoleted_by:"122301-62 ", package:"SUNWhea", version:"11.9.0,REV=2002.11.04.02.51") < 0) flag++; if (solaris_check_patch(release:"5.9_x86", arch:"i386", patch:"119435-29", obsoleted_by:"122301-62 ", package:"SUNWcstl", version:"11.9.0,REV=2002.11.04.02.51") < 0) flag++; if (solaris_check_patch(release:"5.9_x86", arch:"i386", patch:"119435-29", obsoleted_by:"122301-62 ", package:"SUNWcsr", version:"11.9.0,REV=2002.11.04.02.51") < 0) flag++; if (solaris_check_patch(release:"5.9_x86", arch:"i386", patch:"119435-29", obsoleted_by:"122301-62 ", package:"SUNWcsl", version:"11.9.0,REV=2002.11.04.02.51") < 0) flag++; if (solaris_check_patch(release:"5.9_x86", arch:"i386", patch:"119435-29", obsoleted_by:"122301-62 ", package:"SUNWarc", version:"11.9.0,REV=2002.11.04.02.51") < 0) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:solaris_get_report()); else security_hole(0); exit(0); } audit(AUDIT_HOST_NOT, "affected");
NASL family Solaris Local Security Checks NASL id SOLARIS9_114344.NASL description SunOS 5.9: arp, dlcosmk, ip, and ipgpc Pat. Date this patch was last updated by Sun : Mar/05/10 last seen 2020-06-01 modified 2020-06-02 plugin id 15756 published 2004-11-18 reporter This script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/15756 title Solaris 9 (sparc) : 114344-43 NASL family Solaris Local Security Checks NASL id SOLARIS10_X86_127112.NASL description SunOS 5.10_x86: kernel patch. Date this patch was last updated by Sun : Mar/20/08 last seen 2018-09-02 modified 2018-08-13 plugin id 27083 published 2007-10-17 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=27083 title Solaris 10 (x86) : 127112-11 NASL family Solaris Local Security Checks NASL id SOLARIS10_127111.NASL description SunOS 5.10: kernel patch. Date this patch was last updated by Sun : Mar/20/08 last seen 2018-09-01 modified 2018-08-13 plugin id 27075 published 2007-10-17 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=27075 title Solaris 10 (sparc) : 127111-11
Oval
accepted | 2008-05-26T04:00:15.482-04:00 | ||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||
description | Sun Solaris 8, 9, and 10 allows "remote privileged" users to cause a denial of service (panic) via unknown vectors related to self encapsulated IP packets. | ||||||||||||||||||||||||
family | unix | ||||||||||||||||||||||||
id | oval:org.mitre.oval:def:4848 | ||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||
submitted | 2008-04-15T07:48:47.000-04:00 | ||||||||||||||||||||||||
title | A Security Vulnerability in the Handling of Self Encapsulated IP Packets may Lead to a Denial of Service (DOS) Condition. | ||||||||||||||||||||||||
version | 36 |
References
- http://secunia.com/advisories/29783
- http://secunia.com/advisories/29783
- http://secunia.com/advisories/29817
- http://secunia.com/advisories/29817
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-235901-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-235901-1
- http://support.avaya.com/elmodocs2/security/ASA-2008-173.htm
- http://support.avaya.com/elmodocs2/security/ASA-2008-173.htm
- http://www.securityfocus.com/bid/28732
- http://www.securityfocus.com/bid/28732
- http://www.securitytracker.com/id?1019831
- http://www.securitytracker.com/id?1019831
- http://www.vupen.com/english/advisories/2008/1192/references
- http://www.vupen.com/english/advisories/2008/1192/references
- http://www.vupen.com/english/advisories/2008/1325/references
- http://www.vupen.com/english/advisories/2008/1325/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41762
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41762
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4848
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4848