Vulnerabilities > CVE-2013-5862 - Local Security vulnerability in Oracle Solaris
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
COMPLETE Summary
Unspecified vulnerability in Oracle Solaris 10 and 11.1 allows local users to affect availability via vectors related to CPU performance counters (CPC) drivers, a different vulnerability than CVE-2014-4215.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 1 | |
OS | 1 |
Nessus
NASL family Solaris Local Security Checks NASL id SOLARIS_OCT2013_SRU11_1_9_5_1.NASL description This Solaris system is missing necessary patches to address a critical security update : - Vulnerability in the Solaris component of Oracle and Sun Systems Products Suite (subcomponent: CPU performance counters (CPC) drivers). Supported versions that are affected are 10 and 11.1. Easily exploitable vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized Operating System hang or frequently repeatable crash (complete DOS). (CVE-2013-5862) last seen 2020-06-01 modified 2020-06-02 plugin id 76836 published 2014-07-26 reporter This script is Copyright (C) 2014-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/76836 title Oracle Solaris Critical Patch Update : oct2013_SRU11_1_9_5_1 code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from the Oracle CPU for oct2013. # include("compat.inc"); if (description) { script_id(76836); script_version("1.6"); script_cvs_date("Date: 2018/11/14 14:36:23"); script_cve_id("CVE-2013-5862"); script_bugtraq_id(63072); script_name(english:"Oracle Solaris Critical Patch Update : oct2013_SRU11_1_9_5_1"); script_summary(english:"Check for the oct2013 CPU"); script_set_attribute( attribute:"synopsis", value: "The remote Solaris system is missing a security patch from CPU oct2013." ); script_set_attribute( attribute:"description", value: "This Solaris system is missing necessary patches to address a critical security update : - Vulnerability in the Solaris component of Oracle and Sun Systems Products Suite (subcomponent: CPU performance counters (CPC) drivers). Supported versions that are affected are 10 and 11.1. Easily exploitable vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized Operating System hang or frequently repeatable crash (complete DOS). (CVE-2013-5862)" ); script_set_attribute( attribute:"see_also", value:"https://support.oracle.com/epmos/faces/DocumentDisplay?id=1586053.1" ); # https://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/1865183.xml script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?b97601f8" ); script_set_attribute( attribute:"solution", value:"Install the oct2013 CPU from the Oracle support website." ); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:solaris:11.1"); script_set_attribute(attribute:"patch_publication_date", value:"2015/02/24"); script_set_attribute(attribute:"plugin_publication_date", value:"2014/07/26"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2014-2018 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Solaris Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Solaris11/release"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("solaris.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/Solaris11/release"); if (isnull(release)) audit(AUDIT_OS_NOT, "Solaris11"); fix_release = "0.5.11-0.175.1.9.0.5.1"; flag = 0; if (solaris_check_release(release:"0.5.11-0.175.1.9.0.5.1", sru:"11.1.9.5.1") > 0) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:solaris_get_report2()); else security_warning(0); exit(0); } audit(AUDIT_OS_RELEASE_NOT, "Solaris", fix_release, release);
NASL family Solaris Local Security Checks NASL id SOLARIS10_150400.NASL description Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). The supported version that is affected is 10. Easily exploitable vulnerability allows unauthenticated attacker with network access via ICMP to compromise Solaris. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Solaris. Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: SPARC Platform). Supported versions that are affected are 10 and 11.3. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Solaris accessible data as well as unauthorized access to critical data or complete access to all Solaris accessible data. This plugin has been deprecated and either replaced with individual 150400 patch-revision plugins, or deemed non-security related. last seen 2019-02-21 modified 2018-07-30 plugin id 69904 published 2013-09-15 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=69904 title Solaris 10 (sparc) : 150400-59 (deprecated) NASL family Solaris Local Security Checks NASL id SOLARIS10_X86_150401.NASL description Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). The supported version that is affected is 10. Easily exploitable vulnerability allows unauthenticated attacker with network access via ICMP to compromise Solaris. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Solaris. Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: SPARC Platform). Supported versions that are affected are 10 and 11.3. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Solaris accessible data as well as unauthorized access to critical data or complete access to all Solaris accessible data. This plugin has been deprecated and either replaced with individual 150401 patch-revision plugins, or deemed non-security related. last seen 2019-02-21 modified 2018-07-30 plugin id 68873 published 2013-07-14 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=68873 title Solaris 10 (x86) : 150401-59 (deprecated)
Oval
accepted | 2013-12-30T04:00:18.209-05:00 | ||||||||
class | vulnerability | ||||||||
contributors |
| ||||||||
definition_extensions |
| ||||||||
description | Unspecified vulnerability in Oracle Solaris 10 and 11.1 allows local users to affect availability via vectors related to CPU performance counters (CPC) drivers. | ||||||||
family | unix | ||||||||
id | oval:org.mitre.oval:def:18970 | ||||||||
status | accepted | ||||||||
submitted | 2013-11-20T11:43:28.000-05:00 | ||||||||
title | CRITICAL PATCH UPDATE OCTOBER 2013 | ||||||||
version | 37 |