Vulnerabilities > CVE-2012-3178 - Unspecified vulnerability in SUN Sunos 5.11
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN sun
nessus
Summary
Unspecified vulnerability in the kernel in Oracle Sun Solaris 11 allows local users to affect availability via unknown vectors.
Nessus
NASL family Solaris Local Security Checks NASL id SOLARIS_JAN2013_SRU2_5.NASL description This Solaris system is missing necessary patches to address a critical security update : - Vulnerability in the Solaris component of Oracle Sun Products Suite (subcomponent: Kernel). The supported version that is affected is 11. Easily exploitable vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Solaris. (CVE-2012-3178) last seen 2020-06-01 modified 2020-06-02 plugin id 76811 published 2014-07-26 reporter This script is Copyright (C) 2014-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/76811 title Oracle Solaris Critical Patch Update : jan2013_SRU2_5 code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from the Oracle CPU for jan2013. # include("compat.inc"); if (description) { script_id(76811); script_version("1.6"); script_cvs_date("Date: 2018/11/14 14:36:23"); script_cve_id("CVE-2012-3178"); script_bugtraq_id(57406); script_name(english:"Oracle Solaris Critical Patch Update : jan2013_SRU2_5"); script_summary(english:"Check for the jan2013 CPU"); script_set_attribute( attribute:"synopsis", value: "The remote Solaris system is missing a security patch from CPU jan2013." ); script_set_attribute( attribute:"description", value: "This Solaris system is missing necessary patches to address a critical security update : - Vulnerability in the Solaris component of Oracle Sun Products Suite (subcomponent: Kernel). The supported version that is affected is 11. Easily exploitable vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Solaris. (CVE-2012-3178)" ); script_set_attribute( attribute:"see_also", value:"https://support.oracle.com/epmos/faces/DocumentDisplay?id=1517145.1" ); # https://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/1841213.xml script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?4bc2bddf" ); script_set_attribute( attribute:"solution", value:"Install the jan2013 CPU from the Oracle support website." ); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:solaris:11.1"); script_set_attribute(attribute:"patch_publication_date", value:"2013/05/13"); script_set_attribute(attribute:"plugin_publication_date", value:"2014/07/26"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2014-2018 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Solaris Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Solaris11/release"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("solaris.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/Solaris11/release"); if (isnull(release)) audit(AUDIT_OS_NOT, "Solaris11"); fix_release = "0.5.11-0.175.1.2.0.5.0"; flag = 0; if (solaris_check_release(release:"0.5.11-0.175.1.2.0.5.0", sru:"11.1.2.5") > 0) flag++; if (flag) { if (report_verbosity > 0) security_note(port:0, extra:solaris_get_report2()); else security_note(0); exit(0); } audit(AUDIT_OS_RELEASE_NOT, "Solaris", fix_release, release);
NASL family Solaris Local Security Checks NASL id SOLARIS_JAN2013_SRU11_1_2_5_0.NASL description This Solaris system is missing necessary patches to address a critical security update : - Vulnerability in the Solaris component of Oracle Sun Products Suite (subcomponent: Kernel). The supported version that is affected is 11. Easily exploitable vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Solaris. (CVE-2012-3178) last seen 2020-06-01 modified 2020-06-02 plugin id 78461 published 2014-10-15 reporter This script is Copyright (C) 2014-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/78461 title Oracle Solaris Critical Patch Update : jan2013_SRU11_1_2_5_0 code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from the Oracle CPU for jan2013. # include("compat.inc"); if (description) { script_id(78461); script_version("1.4"); script_cvs_date("Date: 2018/08/13 14:32:38"); script_cve_id("CVE-2012-3178"); script_name(english:"Oracle Solaris Critical Patch Update : jan2013_SRU11_1_2_5_0"); script_summary(english:"Check for the jan2013 CPU"); script_set_attribute( attribute:"synopsis", value: "The remote Solaris system is missing a security patch from CPU jan2013." ); script_set_attribute( attribute:"description", value: "This Solaris system is missing necessary patches to address a critical security update : - Vulnerability in the Solaris component of Oracle Sun Products Suite (subcomponent: Kernel). The supported version that is affected is 11. Easily exploitable vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Solaris. (CVE-2012-3178)" ); # http://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/1841213.xml script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?055f6846" ); # http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?b56cce0c" ); script_set_attribute( attribute:"see_also", value:"https://support.oracle.com/rs?type=doc&id=1517145.1" ); script_set_attribute( attribute:"solution", value:"Install the jan2013 CPU from the Oracle support website." ); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:solaris"); script_set_attribute(attribute:"patch_publication_date", value:"2013/05/13"); script_set_attribute(attribute:"plugin_publication_date", value:"2014/10/15"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc."); script_family(english:"Solaris Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Solaris11/release"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("solaris.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/Solaris11/release"); if (isnull(release)) audit(AUDIT_OS_NOT, "Solaris11"); fix_release = "0.5.11-0.175.1.2.0.5.0"; flag = 0; if (solaris_check_release(release:"0.5.11-0.175.1.2.0.5.0", sru:"11.1.2.5") > 0) flag++; if (flag) { if (report_verbosity > 0) security_note(port:0, extra:solaris_get_report2()); else security_note(0); exit(0); } audit(AUDIT_OS_RELEASE_NOT, "Solaris", fix_release, release);