Solaris 9, with Solaris Auditing enabled and certain patches for sshd installed, can generate audit records with an audit-ID of 0 even when the user logging into ssh is not root, which makes it easier for attackers to avoid detection and can make it more difficult to conduct forensics activities.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/44332 - | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-26-103172-1 - Patch | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-66-201310-1 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/39185 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5282 - |
Information
Published : 2007-12-20 23:46
Updated : 2024-11-21 00:40
NVD link : CVE-2007-6505
Mitre link : CVE-2007-6505
CVE.ORG link : CVE-2007-6505
JSON object : View
Products Affected
sun
- solaris
CWE
CWE-16
Configuration