Vulnerabilities > CVE-2012-1681 - Unspecified vulnerability in SUN Sunos
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN sun
nessus
Summary
Unspecified vulnerability in Oracle Sun Solaris 8, 9, 10, and 11 allows local users to affect availability via unknown vectors related to Kernel/sockfs.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 4 |
Nessus
NASL family Solaris Local Security Checks NASL id SOLARIS10_148601.NASL description SunOS 5.10: sockfs patch. Date this patch was last updated by Sun : Feb/15/12 last seen 2018-09-01 modified 2018-07-30 plugin id 58028 published 2012-02-20 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=58028 title Solaris 10 (sparc) : 148601-01 code # @DEPRECATED@ # # This script has been deprecated as the associated patch is not # currently a security fix. # # Disabled on 2013/04/30. # # # (C) Tenable Network Security, Inc. # # if ( ! defined_func("bn_random") ) exit(0); include("compat.inc"); if(description) { script_id(58028); script_version("1.10"); script_name(english: "Solaris 10 (sparc) : 148601-01"); script_cve_id("CVE-2012-1681"); script_set_attribute(attribute: "synopsis", value: "The remote host is missing Sun Security Patch number 148601-01"); script_set_attribute(attribute: "description", value: 'SunOS 5.10: sockfs patch. Date this patch was last updated by Sun : Feb/15/12'); script_set_attribute(attribute: "solution", value: "You should install this patch for your system to be up-to-date."); script_set_attribute(attribute: "see_also", value: "https://getupdates.oracle.com/readme/148601-01"); script_set_attribute(attribute: "cvss_vector", value: "CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C"); script_set_attribute(attribute: "patch_publication_date", value: "2012/02/15"); script_set_attribute(attribute: "cpe", value: "cpe:/o:sun:solaris"); script_set_attribute(attribute: "plugin_type", value: "local"); script_set_attribute(attribute:"plugin_publication_date", value:"2012/02/20"); script_cvs_date("Date: 2018/07/30 13:40:14"); script_end_attributes(); script_summary(english: "Check for patch 148601-01"); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2012-2018 Tenable Network Security, Inc."); family["english"] = "Solaris Local Security Checks"; script_family(english:family["english"]); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/Solaris/showrev"); exit(0); } # Deprecated. exit(0, "The associated patch is not currently a security fix.");
NASL family Solaris Local Security Checks NASL id SOLARIS_APR2012_SRU3.NASL description This Solaris system is missing necessary patches to address critical security updates : - Vulnerability in the Solaris component of Oracle Sun Products Suite (subcomponent: Kernel/sockfs ). Supported versions that are affected are 8, 9, 10 and 11. Easily exploitable vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized Operating System hang or frequently repeatable crash (complete DOS). (CVE-2012-1681) - Vulnerability in the Solaris component of Oracle Sun Products Suite (subcomponent: Password Policy). Supported versions that are affected are 8, 9, 10 and 11. Easily exploitable vulnerability requiring logon to Operating System plus additional login/authentication to component or subcomponent. Successful attack of this vulnerability can escalate attacker privileges resulting in unauthorized update, insert or delete access to some Solaris accessible data as well as read access to a subset of Solaris accessible data and ability to cause a partial denial of service (partial DOS) of Solaris. (CVE-2012-1684) last seen 2020-06-01 modified 2020-06-02 plugin id 76800 published 2014-07-26 reporter This script is Copyright (C) 2014-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/76800 title Oracle Solaris Critical Patch Update : apr2012_SRU3 code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from the Oracle CPU for apr2012. # include("compat.inc"); if (description) { script_id(76800); script_version("1.6"); script_cvs_date("Date: 2018/11/14 14:36:23"); script_cve_id("CVE-2012-1681", "CVE-2012-1684"); script_bugtraq_id(53135, 53138); script_name(english:"Oracle Solaris Critical Patch Update : apr2012_SRU3"); script_summary(english:"Check for the apr2012 CPU"); script_set_attribute( attribute:"synopsis", value: "The remote Solaris system is missing a security patch from CPU apr2012." ); script_set_attribute( attribute:"description", value: "This Solaris system is missing necessary patches to address critical security updates : - Vulnerability in the Solaris component of Oracle Sun Products Suite (subcomponent: Kernel/sockfs ). Supported versions that are affected are 8, 9, 10 and 11. Easily exploitable vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized Operating System hang or frequently repeatable crash (complete DOS). (CVE-2012-1681) - Vulnerability in the Solaris component of Oracle Sun Products Suite (subcomponent: Password Policy). Supported versions that are affected are 8, 9, 10 and 11. Easily exploitable vulnerability requiring logon to Operating System plus additional login/authentication to component or subcomponent. Successful attack of this vulnerability can escalate attacker privileges resulting in unauthorized update, insert or delete access to some Solaris accessible data as well as read access to a subset of Solaris accessible data and ability to cause a partial denial of service (partial DOS) of Solaris. (CVE-2012-1684)" ); # http://support.oracle.com/CSP/main/article?cmd=show&type=NOT&id=1446032.1 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?75401354" ); # https://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/1690959.xml script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?7ef6c355" ); script_set_attribute( attribute:"solution", value:"Install the apr2012 CPU from the Oracle support website." ); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:solaris:11.0"); script_set_attribute(attribute:"patch_publication_date", value:"2012/04/17"); script_set_attribute(attribute:"plugin_publication_date", value:"2014/07/26"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2014-2018 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Solaris Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Solaris11/release"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("solaris.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/Solaris11/release"); if (isnull(release)) audit(AUDIT_OS_NOT, "Solaris11"); fix_release = "0.5.11-0.175.0.3.0.4.0"; flag = 0; if (solaris_check_release(release:"0.5.11-0.175.0.3.0.4.0", sru:"11/11 SRU 3") > 0) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:solaris_get_report2()); else security_warning(0); exit(0); } audit(AUDIT_OS_RELEASE_NOT, "Solaris", fix_release, release);
NASL family Solaris Local Security Checks NASL id SOLARIS10_X86_148602.NASL description SunOS 5.10_x86: sockfs patch. Date this patch was last updated by Sun : Feb/15/12 last seen 2018-09-01 modified 2018-07-30 plugin id 58029 published 2012-02-20 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=58029 title Solaris 10 (x86) : 148602-01 code # @DEPRECATED@ # # This script has been deprecated as the associated patch is not # currently a security fix. # # Disabled on 2013/02/25. # # # (C) Tenable Network Security, Inc. # # if ( ! defined_func("bn_random") ) exit(0); include("compat.inc"); if(description) { script_id(58029); script_version("1.8"); script_name(english: "Solaris 10 (x86) : 148602-01"); script_cve_id("CVE-2012-1681"); script_set_attribute(attribute: "synopsis", value: "The remote host is missing Sun Security Patch number 148602-01"); script_set_attribute(attribute: "description", value: 'SunOS 5.10_x86: sockfs patch. Date this patch was last updated by Sun : Feb/15/12'); script_set_attribute(attribute: "solution", value: "You should install this patch for your system to be up-to-date."); script_set_attribute(attribute: "see_also", value: "https://getupdates.oracle.com/readme/148602-01"); script_set_attribute(attribute: "cvss_vector", value: "CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C"); script_set_attribute(attribute: "patch_publication_date", value: "2012/02/15"); script_set_attribute(attribute: "cpe", value: "cpe:/o:sun:solaris"); script_set_attribute(attribute: "plugin_type", value: "local"); script_set_attribute(attribute:"plugin_publication_date", value:"2012/02/20"); script_cvs_date("Date: 2018/07/30 13:40:14"); script_end_attributes(); script_summary(english: "Check for patch 148602-01"); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2012-2018 Tenable Network Security, Inc."); family["english"] = "Solaris Local Security Checks"; script_family(english:family["english"]); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/Solaris/showrev"); exit(0); } # Deprecated. exit(0, "The associated patch is not currently a security fix.");
References
- http://secunia.com/advisories/48809
- http://secunia.com/advisories/48809
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
- http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html
- http://www.securitytracker.com/id?1026940
- http://www.securitytracker.com/id?1026940