Solaris 10 (sparc) : 150400-59 (deprecated)

high Nessus Plugin ID 69904

Synopsis

This plugin has been deprecated.

Description

Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). The supported version that is affected is 10. Easily exploitable vulnerability allows unauthenticated attacker with network access via ICMP to compromise Solaris.
Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Solaris.

Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: SPARC Platform). Supported versions that are affected are 10 and 11.3. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Solaris accessible data as well as unauthorized access to critical data or complete access to all Solaris accessible data.

This plugin has been deprecated and either replaced with individual 150400 patch-revision plugins, or deemed non-security related.

See Also

https://getupdates.oracle.com/readme/150400-59

Plugin Details

Severity: High

ID: 69904

File Name: solaris10_150400.nasl

Version: 1.105

Type: local

Published: 9/15/2013

Updated: 7/30/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:sun:solaris

Required KB Items: Host/local_checks_enabled, Host/Solaris/showrev

Exploit Ease: No known exploits are available

Patch Publication Date: 1/16/2018

Reference Information

CVE: CVE-2013-5862, CVE-2014-0447, CVE-2014-6473, CVE-2018-2710, CVE-2018-2717

BID: 63072, 66826, 70546