CVE-2009-4211

The U.S. Defense Information Systems Agency (DISA) Security Readiness Review (SRR) script for the Solaris x86 platform executes files in arbitrary directories as root for filenames equal to (1) java, (2) openssl, (3) php, (4) snort, (5) tshark, (6) vncserver, or (7) wireshark, which allows local users to gain privileges via a Trojan horse program.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:sun:solaris:*:*:x86:*:*:*:*:*
cpe:2.3:a:disa:srr_for_solaris:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:09

Type Values Removed Values Added
References () http://securitytracker.com/id?1023265 - () http://securitytracker.com/id?1023265 -
References () http://www.kb.cert.org/vuls/id/433821 - () http://www.kb.cert.org/vuls/id/433821 -
References () http://www.securityfocus.com/archive/1/508188/100/0/threaded - () http://www.securityfocus.com/archive/1/508188/100/0/threaded -
References () http://www.securityfocus.com/bid/37200 - () http://www.securityfocus.com/bid/37200 -

Information

Published : 2009-12-04 22:30

Updated : 2024-11-21 01:09


NVD link : CVE-2009-4211

Mitre link : CVE-2009-4211

CVE.ORG link : CVE-2009-4211


JSON object : View

Products Affected

disa

  • srr_for_solaris

sun

  • solaris
CWE
CWE-264

Permissions, Privileges, and Access Controls