Vulnerabilities > CVE-2013-3746 - Local Security vulnerability in Oracle Solaris Cluster
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Unspecified vulnerability in the Solaris Cluster component in Oracle and Sun Systems Products Suite 3.2, 3.3, and 4 prior to 4.1 SRU 3 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Zone Cluster Infrastructure.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 4 |
Nessus
NASL family Solaris Local Security Checks NASL id SOLARIS10_X86_144222-11.NASL description Vulnerability in the Solaris Cluster component of Oracle and Sun Systems Products Suite (subcomponent: Zone Cluster Infrastructure). Supported versions that are affected are 3.2, 3.3 and 4 prior to 4.1 SRU 3. Easily exploitable vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution. last seen 2020-06-01 modified 2020-06-02 plugin id 108059 published 2018-03-12 reporter This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/108059 title Solaris 10 (x86) : 144222-11 code # # (C) Tenable Network Security, Inc. # # The descriptive text in this plugin was # extracted from the Oracle SunOS Patch Updates. # include("compat.inc"); if (description) { script_id(108059); script_version("1.3"); script_cvs_date("Date: 2020/01/08"); script_cve_id("CVE-2013-3746"); script_name(english:"Solaris 10 (x86) : 144222-11"); script_summary(english:"Check for patch 144222-11"); script_set_attribute( attribute:"synopsis", value:"The remote host is missing Sun Security Patch number 144222-11" ); script_set_attribute( attribute:"description", value: "Vulnerability in the Solaris Cluster component of Oracle and Sun Systems Products Suite (subcomponent: Zone Cluster Infrastructure). Supported versions that are affected are 3.2, 3.3 and 4 prior to 4.1 SRU 3. Easily exploitable vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution." ); script_set_attribute( attribute:"see_also", value:"https://getupdates.oracle.com/readme/144222-11" ); script_set_attribute(attribute:"solution", value:"Install patch 144222-11 or higher"); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C"); script_set_attribute(attribute:"cvss_score_source", value:"CVE-2013-3746"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:solaris:10:144222"); script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:solaris:10"); script_set_attribute(attribute:"vuln_publication_date", value:"2013/07/17"); script_set_attribute(attribute:"patch_publication_date", value:"2013/06/05"); script_set_attribute(attribute:"plugin_publication_date", value:"2018/03/12"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Solaris Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Solaris/showrev"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); include("solaris.inc"); showrev = get_kb_item("Host/Solaris/showrev"); if (empty_or_null(showrev)) audit(AUDIT_OS_NOT, "Solaris"); os_ver = pregmatch(pattern:"Release: (\d+.(\d+))", string:showrev); if (empty_or_null(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Solaris"); full_ver = os_ver[1]; os_level = os_ver[2]; if (full_ver != "5.10") audit(AUDIT_OS_NOT, "Solaris 10", "Solaris " + os_level); package_arch = pregmatch(pattern:"Application architecture: (\w+)", string:showrev); if (empty_or_null(package_arch)) audit(AUDIT_UNKNOWN_ARCH); package_arch = package_arch[1]; if (package_arch != "i386") audit(AUDIT_ARCH_NOT, "i386", package_arch); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"144222-11", obsoleted_by:"", package:"SUNWsccomu", version:"3.2.0,REV=2006.12.05.21.06") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"144222-11", obsoleted_by:"", package:"SUNWsccomzu", version:"3.2.0,REV=2006.12.05.21.06") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"144222-11", obsoleted_by:"", package:"SUNWscdev", version:"3.2.0,REV=2006.12.05.21.06") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"144222-11", obsoleted_by:"", package:"SUNWscmasau", version:"3.2.0,REV=2006.12.05.21.06") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"144222-11", obsoleted_by:"", package:"SUNWscmd", version:"3.2.0,REV=2006.12.05.21.06") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"144222-11", obsoleted_by:"", package:"SUNWscr", version:"3.2.0,REV=2006.12.05.21.06") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"144222-11", obsoleted_by:"", package:"SUNWscrtlh", version:"3.2.0,REV=2006.12.05.21.06") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"144222-11", obsoleted_by:"", package:"SUNWscu", version:"3.2.0,REV=2006.12.05.21.06") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"144222-11", obsoleted_by:"", package:"SUNWscucm", version:"3.2.0,REV=2006.12.05.21.06") < 0) flag++; if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"144222-11", obsoleted_by:"", package:"SUNWsczu", version:"3.2.0,REV=2006.12.05.21.06") < 0) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_HOLE, extra : solaris_get_report() ); } else { patch_fix = solaris_patch_fix_get(); if (!empty_or_null(patch_fix)) audit(AUDIT_PATCH_INSTALLED, patch_fix, "Solaris 10"); tested = solaris_pkg_tests_get(); if (!empty_or_null(tested)) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); audit(AUDIT_PACKAGE_NOT_INSTALLED, "SUNWsccomu / SUNWsccomzu / SUNWscdev / SUNWscmasau / SUNWscmd / etc"); }
NASL family Solaris Local Security Checks NASL id SOLARIS10_145333.NASL description Vulnerability in the Solaris Cluster component of Oracle and Sun Systems Products Suite (subcomponent: Zone Cluster Infrastructure). Supported versions that are affected are 3.2, 3.3 and 4 prior to 4.1 SRU 3. Easily exploitable vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution. This plugin has been deprecated and either replaced with individual 145333 patch-revision plugins, or deemed non-security related. last seen 2019-02-21 modified 2018-07-30 plugin id 71659 published 2013-12-28 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=71659 title Solaris 10 (sparc) : 145333-39 (deprecated) code # # (C) Tenable Network Security, Inc. # # @DEPRECATED@ # # Disabled on 2018/03/12. Deprecated and either replaced by # individual patch-revision plugins, or has been deemed a # non-security advisory. # include("compat.inc"); if (description) { script_id(71659); script_version("1.22"); script_cvs_date("Date: 2018/07/30 13:40:15"); script_cve_id("CVE-2013-3746", "CVE-2015-2616"); script_name(english:"Solaris 10 (sparc) : 145333-39 (deprecated)"); script_summary(english:"Check for patch 145333-39"); script_set_attribute( attribute:"synopsis", value:"This plugin has been deprecated." ); script_set_attribute( attribute:"description", value: "Vulnerability in the Solaris Cluster component of Oracle and Sun Systems Products Suite (subcomponent: Zone Cluster Infrastructure). Supported versions that are affected are 3.2, 3.3 and 4 prior to 4.1 SRU 3. Easily exploitable vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution. This plugin has been deprecated and either replaced with individual 145333 patch-revision plugins, or deemed non-security related." ); script_set_attribute( attribute:"see_also", value:"https://getupdates.oracle.com/readme/145333-39" ); script_set_attribute( attribute:"solution", value:"n/a" ); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:sun:solaris"); script_set_attribute(attribute:"patch_publication_date", value:"2018/01/08"); script_set_attribute(attribute:"plugin_publication_date", value:"2013/12/28"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2013-2018 Tenable Network Security, Inc."); script_family(english:"Solaris Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Solaris/showrev"); exit(0); } exit(0, "This plugin has been deprecated. Consult specific patch-revision plugins for patch 145333 instead.");
NASL family Solaris Local Security Checks NASL id SOLARIS10_145333-33.NASL description Vulnerability in the Solaris Cluster component of Oracle and Sun Systems Products Suite (subcomponent: Zone Cluster Infrastructure). Supported versions that are affected are 3.2, 3.3 and 4 prior to 4.1 SRU 3. Easily exploitable vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution. last seen 2020-06-01 modified 2020-06-02 plugin id 107581 published 2018-03-12 reporter This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/107581 title Solaris 10 (sparc) : 145333-33 NASL family Solaris Local Security Checks NASL id SOLARIS10_144221-12.NASL description Vulnerability in the Solaris Cluster component of Oracle and Sun Systems Products Suite (subcomponent: Zone Cluster Infrastructure). Supported versions that are affected are 3.2, 3.3 and 4 prior to 4.1 SRU 3. Easily exploitable vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution. last seen 2020-06-01 modified 2020-06-02 plugin id 107564 published 2018-03-12 reporter This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/107564 title Solaris 10 (sparc) : 144221-12 NASL family Solaris Local Security Checks NASL id SOLARIS10_X86_144222.NASL description Vulnerability in the Solaris Cluster component of Oracle and Sun Systems Products Suite (subcomponent: Zone Cluster Infrastructure). Supported versions that are affected are 3.2, 3.3 and 4 prior to 4.1 SRU 3. Easily exploitable vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution. This plugin has been deprecated and either replaced with individual 144222 patch-revision plugins, or deemed non-security related. last seen 2019-02-21 modified 2018-07-30 plugin id 71705 published 2013-12-28 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=71705 title Solaris 10 (x86) : 144222-16 (deprecated) NASL family Solaris Local Security Checks NASL id SOLARIS10_144221.NASL description Vulnerability in the Solaris Cluster component of Oracle and Sun Systems Products Suite (subcomponent: Zone Cluster Infrastructure). Supported versions that are affected are 3.2, 3.3 and 4 prior to 4.1 SRU 3. Easily exploitable vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution. This plugin has been deprecated and either replaced with individual 144221 patch-revision plugins, or deemed non-security related. last seen 2019-02-21 modified 2018-07-30 plugin id 71658 published 2013-12-28 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=71658 title Solaris 10 (sparc) : 144221-17 (deprecated) NASL family Solaris Local Security Checks NASL id SOLARIS10_145333-34.NASL description Vulnerability in the Solaris Cluster component of Oracle and Sun Systems Products Suite (subcomponent: Zone Cluster Infrastructure). Supported versions that are affected are 3.2, 3.3 and 4 prior to 4.1 SRU 3. Easily exploitable vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution. last seen 2020-06-01 modified 2020-06-02 plugin id 107582 published 2018-03-12 reporter This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/107582 title Solaris 10 (sparc) : 145333-34