Vulnerabilities > CVE-2014-6480 - Local Security vulnerability in Oracle Solaris Cluster

047910
CVSS 6.5 - MEDIUM
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
MULTIPLE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
local
low complexity
oracle
nessus

Summary

Unspecified vulnerability in the Solaris Cluster component in Oracle Sun Systems Products Suite 3.3 and 4.1 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to System management.

Vulnerable Configurations

Part Description Count
Application
Oracle
2

Nessus

  • NASL familySolaris Local Security Checks
    NASL idSOLARIS10_X86_145334-33.NASL
    descriptionVulnerability in the Solaris Cluster component of Oracle Sun Systems Products Suite (subcomponent: System management). Supported versions that are affected are 3.3 and 4.1. Easily exploitable vulnerability allows successful authenticated network attacks via TCP/IP. Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution. Vulnerability in the Solaris Cluster component of Oracle Sun Systems Products Suite (subcomponent: System management). Supported versions that are affected are 3.3 and 4.1. Easily exploitable vulnerability requiring logon to Operating System plus additional, multiple logins to components. Successful attack of this vulnerability can escalate attacker privileges resulting in unauthorized Operating System takeover including arbitrary code execution.
    last seen2020-06-01
    modified2020-06-02
    plugin id108075
    published2018-03-12
    reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/108075
    titleSolaris 10 (x86) : 145334-33
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text in this plugin was
    # extracted from the Oracle SunOS Patch Updates.
    #
    include("compat.inc");
    
    if (description)
    {
      script_id(108075);
      script_version("1.4");
      script_cvs_date("Date: 2020/01/08");
    
      script_cve_id("CVE-2014-4259", "CVE-2014-6480");
    
      script_name(english:"Solaris 10 (x86) : 145334-33");
      script_summary(english:"Check for patch 145334-33");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote host is missing Sun Security Patch number 145334-33"
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Vulnerability in the Solaris Cluster component of Oracle Sun Systems
    Products Suite (subcomponent: System management). Supported versions
    that are affected are 3.3 and 4.1. Easily exploitable vulnerability
    allows successful authenticated network attacks via TCP/IP. Successful
    attack of this vulnerability can result in unauthorized Operating
    System takeover including arbitrary code execution.
    
    Vulnerability in the Solaris Cluster component of Oracle Sun Systems
    Products Suite (subcomponent: System management). Supported versions
    that are affected are 3.3 and 4.1. Easily exploitable vulnerability
    requiring logon to Operating System plus additional, multiple logins
    to components. Successful attack of this vulnerability can escalate
    attacker privileges resulting in unauthorized Operating System
    takeover including arbitrary code execution."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://getupdates.oracle.com/readme/145334-33"
      );
      script_set_attribute(attribute:"solution", value:"Install patch 145334-33 or higher");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2014-4259");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:solaris:10:145334");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:solaris:10:145641");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:solaris:10");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2015/01/21");
      script_set_attribute(attribute:"patch_publication_date", value:"2015/06/27");
      script_set_attribute(attribute:"plugin_publication_date", value:"2018/03/12");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Solaris Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Solaris/showrev");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("solaris.inc");
    
    showrev = get_kb_item("Host/Solaris/showrev");
    if (empty_or_null(showrev)) audit(AUDIT_OS_NOT, "Solaris");
    os_ver = pregmatch(pattern:"Release: (\d+.(\d+))", string:showrev);
    if (empty_or_null(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Solaris");
    full_ver = os_ver[1];
    os_level = os_ver[2];
    if (full_ver != "5.10") audit(AUDIT_OS_NOT, "Solaris 10", "Solaris " + os_level);
    package_arch = pregmatch(pattern:"Application architecture: (\w+)", string:showrev);
    if (empty_or_null(package_arch)) audit(AUDIT_UNKNOWN_ARCH);
    package_arch = package_arch[1];
    if (package_arch != "i386") audit(AUDIT_ARCH_NOT, "i386", package_arch);
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-33", obsoleted_by:"", package:"SUNWsccomu", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-33", obsoleted_by:"", package:"SUNWsccomzu", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-33", obsoleted_by:"", package:"SUNWscderby", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-33", obsoleted_by:"", package:"SUNWscdev", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-33", obsoleted_by:"", package:"SUNWscgds", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-33", obsoleted_by:"", package:"SUNWscmasa", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-33", obsoleted_by:"", package:"SUNWscmasar", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-33", obsoleted_by:"", package:"SUNWscmasasen", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-33", obsoleted_by:"", package:"SUNWscmasau", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-33", obsoleted_by:"", package:"SUNWscmasazu", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-33", obsoleted_by:"", package:"SUNWscmautil", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-33", obsoleted_by:"", package:"SUNWscmd", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-33", obsoleted_by:"", package:"SUNWscr", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-33", obsoleted_by:"", package:"SUNWscrtlh", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-33", obsoleted_by:"", package:"SUNWscsal", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-33", obsoleted_by:"", package:"SUNWscsmf", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-33", obsoleted_by:"", package:"SUNWscspmu", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-33", obsoleted_by:"", package:"SUNWsctelemetry", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-33", obsoleted_by:"", package:"SUNWscu", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-33", obsoleted_by:"", package:"SUNWscucm", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-33", obsoleted_by:"", package:"SUNWsczr", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-33", obsoleted_by:"", package:"SUNWsczu", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    
    if (flag) {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_HOLE,
        extra      : solaris_get_report()
      );
    } else {
      patch_fix = solaris_patch_fix_get();
      if (!empty_or_null(patch_fix)) audit(AUDIT_PATCH_INSTALLED, patch_fix, "Solaris 10");
      tested = solaris_pkg_tests_get();
      if (!empty_or_null(tested)) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      audit(AUDIT_PACKAGE_NOT_INSTALLED, "SUNWsccomu / SUNWsccomzu / SUNWscderby / SUNWscdev / SUNWscgds / etc");
    }
    
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS10_X86_145334.NASL
    descriptionVulnerability in the Solaris Cluster component of Oracle Sun Systems Products Suite (subcomponent: System management). Supported versions that are affected are 3.3 and 4.1. Easily exploitable vulnerability allows successful authenticated network attacks via TCP/IP. Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution. Vulnerability in the Solaris Cluster component of Oracle Sun Systems Products Suite (subcomponent: System management). Supported versions that are affected are 3.3 and 4.1. Easily exploitable vulnerability requiring logon to Operating System plus additional, multiple logins to components. Successful attack of this vulnerability can escalate attacker privileges resulting in unauthorized Operating System takeover including arbitrary code execution. This plugin has been deprecated and either replaced with individual 145334 patch-revision plugins, or deemed non-security related.
    last seen2019-02-21
    modified2018-07-30
    plugin id71706
    published2013-12-28
    reporterTenable
    sourcehttps://www.tenable.com/plugins/index.php?view=single&id=71706
    titleSolaris 10 (x86) : 145334-39 (deprecated)
    code
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # @DEPRECATED@
    #
    # Disabled on 2018/03/12. Deprecated and either replaced by
    # individual patch-revision plugins, or has been deemed a
    # non-security advisory.
    #
    include("compat.inc");
    
    if (description)
    {
      script_id(71706);
      script_version("1.22");
      script_cvs_date("Date: 2018/07/30 13:40:15");
    
      script_cve_id("CVE-2014-4259", "CVE-2014-6480", "CVE-2015-2616");
    
      script_name(english:"Solaris 10 (x86) : 145334-39 (deprecated)");
      script_summary(english:"Check for patch 145334-39");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"This plugin has been deprecated."
      );
      script_set_attribute(
        attribute:"description",
        value:
    "Vulnerability in the Solaris Cluster component of Oracle Sun Systems
    Products Suite (subcomponent: System management). Supported versions
    that are affected are 3.3 and 4.1. Easily exploitable vulnerability
    allows successful authenticated network attacks via TCP/IP. Successful
    attack of this vulnerability can result in unauthorized Operating
    System takeover including arbitrary code execution.
    
    Vulnerability in the Solaris Cluster component of Oracle Sun Systems
    Products Suite (subcomponent: System management). Supported versions
    that are affected are 3.3 and 4.1. Easily exploitable vulnerability
    requiring logon to Operating System plus additional, multiple logins
    to components. Successful attack of this vulnerability can escalate
    attacker privileges resulting in unauthorized Operating System
    takeover including arbitrary code execution.
    
    This plugin has been deprecated and either replaced with individual
    145334 patch-revision plugins, or deemed non-security related."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://getupdates.oracle.com/readme/145334-39"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"n/a"
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:sun:solaris");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2018/01/08");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/12/28");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2013-2018 Tenable Network Security, Inc.");
      script_family(english:"Solaris Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Solaris/showrev");
    
      exit(0);
    }
    
    exit(0, "This plugin has been deprecated. Consult specific patch-revision plugins for patch 145334 instead.");
    
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS10_X86_145334-34.NASL
    descriptionVulnerability in the Solaris Cluster component of Oracle Sun Systems Products Suite (subcomponent: System management). Supported versions that are affected are 3.3 and 4.1. Easily exploitable vulnerability allows successful authenticated network attacks via TCP/IP. Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution. Vulnerability in the Solaris Cluster component of Oracle Sun Systems Products Suite (subcomponent: System management). Supported versions that are affected are 3.3 and 4.1. Easily exploitable vulnerability requiring logon to Operating System plus additional, multiple logins to components. Successful attack of this vulnerability can escalate attacker privileges resulting in unauthorized Operating System takeover including arbitrary code execution.
    last seen2020-06-01
    modified2020-06-02
    plugin id108076
    published2018-03-12
    reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/108076
    titleSolaris 10 (x86) : 145334-34
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text in this plugin was
    # extracted from the Oracle SunOS Patch Updates.
    #
    include("compat.inc");
    
    if (description)
    {
      script_id(108076);
      script_version("1.4");
      script_cvs_date("Date: 2020/01/08");
    
      script_cve_id("CVE-2014-4259", "CVE-2014-6480");
    
      script_name(english:"Solaris 10 (x86) : 145334-34");
      script_summary(english:"Check for patch 145334-34");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote host is missing Sun Security Patch number 145334-34"
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Vulnerability in the Solaris Cluster component of Oracle Sun Systems
    Products Suite (subcomponent: System management). Supported versions
    that are affected are 3.3 and 4.1. Easily exploitable vulnerability
    allows successful authenticated network attacks via TCP/IP. Successful
    attack of this vulnerability can result in unauthorized Operating
    System takeover including arbitrary code execution.
    
    Vulnerability in the Solaris Cluster component of Oracle Sun Systems
    Products Suite (subcomponent: System management). Supported versions
    that are affected are 3.3 and 4.1. Easily exploitable vulnerability
    requiring logon to Operating System plus additional, multiple logins
    to components. Successful attack of this vulnerability can escalate
    attacker privileges resulting in unauthorized Operating System
    takeover including arbitrary code execution."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://getupdates.oracle.com/readme/145334-34"
      );
      script_set_attribute(attribute:"solution", value:"Install patch 145334-34 or higher");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2014-4259");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:solaris:10:145334");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:solaris:10:145641");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:solaris:10");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2015/01/21");
      script_set_attribute(attribute:"patch_publication_date", value:"2015/11/24");
      script_set_attribute(attribute:"plugin_publication_date", value:"2018/03/12");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Solaris Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Solaris/showrev");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("solaris.inc");
    
    showrev = get_kb_item("Host/Solaris/showrev");
    if (empty_or_null(showrev)) audit(AUDIT_OS_NOT, "Solaris");
    os_ver = pregmatch(pattern:"Release: (\d+.(\d+))", string:showrev);
    if (empty_or_null(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Solaris");
    full_ver = os_ver[1];
    os_level = os_ver[2];
    if (full_ver != "5.10") audit(AUDIT_OS_NOT, "Solaris 10", "Solaris " + os_level);
    package_arch = pregmatch(pattern:"Application architecture: (\w+)", string:showrev);
    if (empty_or_null(package_arch)) audit(AUDIT_UNKNOWN_ARCH);
    package_arch = package_arch[1];
    if (package_arch != "i386") audit(AUDIT_ARCH_NOT, "i386", package_arch);
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-34", obsoleted_by:"", package:"SUNWsccomu", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-34", obsoleted_by:"", package:"SUNWsccomzu", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-34", obsoleted_by:"", package:"SUNWscderby", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-34", obsoleted_by:"", package:"SUNWscdev", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-34", obsoleted_by:"", package:"SUNWscgds", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-34", obsoleted_by:"", package:"SUNWscmasa", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-34", obsoleted_by:"", package:"SUNWscmasar", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-34", obsoleted_by:"", package:"SUNWscmasasen", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-34", obsoleted_by:"", package:"SUNWscmasau", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-34", obsoleted_by:"", package:"SUNWscmasazu", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-34", obsoleted_by:"", package:"SUNWscmautil", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-34", obsoleted_by:"", package:"SUNWscmd", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-34", obsoleted_by:"", package:"SUNWscr", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-34", obsoleted_by:"", package:"SUNWscrtlh", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-34", obsoleted_by:"", package:"SUNWscsal", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-34", obsoleted_by:"", package:"SUNWscsmf", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-34", obsoleted_by:"", package:"SUNWscspmu", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-34", obsoleted_by:"", package:"SUNWsctelemetry", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-34", obsoleted_by:"", package:"SUNWscu", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-34", obsoleted_by:"", package:"SUNWscucm", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-34", obsoleted_by:"", package:"SUNWsczr", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"145334-34", obsoleted_by:"", package:"SUNWsczu", version:"3.3.0,REV=2010.07.26.13.13") < 0) flag++;
    
    if (flag) {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_HOLE,
        extra      : solaris_get_report()
      );
    } else {
      patch_fix = solaris_patch_fix_get();
      if (!empty_or_null(patch_fix)) audit(AUDIT_PATCH_INSTALLED, patch_fix, "Solaris 10");
      tested = solaris_pkg_tests_get();
      if (!empty_or_null(tested)) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      audit(AUDIT_PACKAGE_NOT_INSTALLED, "SUNWsccomu / SUNWsccomzu / SUNWscderby / SUNWscdev / SUNWscgds / etc");
    }