CVE-2010-4435

Unspecified vulnerability in Oracle Solaris 8, 9, and 10 allows remote attackers to affect confidentiality, integrity, and availability, related to CDE Calendar Manager Service Daemon and RPC. NOTE: the previous information was obtained from the January 2011 CPU. Oracle has not commented on claims from other software vendors that this affects other operating systems, such as HP-UX, or claims from a reliable third party that this is a buffer overflow in rpc.cmsd via long XDR-encoded ASCII strings in RPC call 10.
References
Link Resource
http://aix.software.ibm.com/aix/efixes/security/cmsd_advisory.asc
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02702395
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02702395
http://osvdb.org/70569
http://secunia.com/advisories/42984 Vendor Advisory
http://secunia.com/advisories/43258 Vendor Advisory
http://securityreason.com/securityalert/8069
http://www.exploit-db.com/exploits/16137 Exploit
http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html Vendor Advisory
http://www.securityfocus.com/archive/1/516284/100/0/threaded
http://www.securityfocus.com/archive/1/516304/100/0/threaded
http://www.securityfocus.com/bid/45853
http://www.securityfocus.com/bid/46261
http://www.securitytracker.com/id?1024975
http://www.vupen.com/english/advisories/2011/0151 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0352 Vendor Advisory
http://www.zerodayinitiative.com/advisories/ZDI-11-062/
https://exchange.xforce.ibmcloud.com/vulnerabilities/64797
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12794
http://aix.software.ibm.com/aix/efixes/security/cmsd_advisory.asc
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02702395
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02702395
http://osvdb.org/70569
http://secunia.com/advisories/42984 Vendor Advisory
http://secunia.com/advisories/43258 Vendor Advisory
http://securityreason.com/securityalert/8069
http://www.exploit-db.com/exploits/16137 Exploit
http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html Vendor Advisory
http://www.securityfocus.com/archive/1/516284/100/0/threaded
http://www.securityfocus.com/archive/1/516304/100/0/threaded
http://www.securityfocus.com/bid/45853
http://www.securityfocus.com/bid/46261
http://www.securitytracker.com/id?1024975
http://www.vupen.com/english/advisories/2011/0151 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0352 Vendor Advisory
http://www.zerodayinitiative.com/advisories/ZDI-11-062/
https://exchange.xforce.ibmcloud.com/vulnerabilities/64797
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12794
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*
cpe:2.3:o:sun:sunos:5.9:*:*:*:*:*:*:*
cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*

History

21 Nov 2024, 01:20

Type Values Removed Values Added
References () http://aix.software.ibm.com/aix/efixes/security/cmsd_advisory.asc - () http://aix.software.ibm.com/aix/efixes/security/cmsd_advisory.asc -
References () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02702395 - () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02702395 -
References () http://osvdb.org/70569 - () http://osvdb.org/70569 -
References () http://secunia.com/advisories/42984 - Vendor Advisory () http://secunia.com/advisories/42984 - Vendor Advisory
References () http://secunia.com/advisories/43258 - Vendor Advisory () http://secunia.com/advisories/43258 - Vendor Advisory
References () http://securityreason.com/securityalert/8069 - () http://securityreason.com/securityalert/8069 -
References () http://www.exploit-db.com/exploits/16137 - Exploit () http://www.exploit-db.com/exploits/16137 - Exploit
References () http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html - Vendor Advisory () http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html - Vendor Advisory
References () http://www.securityfocus.com/archive/1/516284/100/0/threaded - () http://www.securityfocus.com/archive/1/516284/100/0/threaded -
References () http://www.securityfocus.com/archive/1/516304/100/0/threaded - () http://www.securityfocus.com/archive/1/516304/100/0/threaded -
References () http://www.securityfocus.com/bid/45853 - () http://www.securityfocus.com/bid/45853 -
References () http://www.securityfocus.com/bid/46261 - () http://www.securityfocus.com/bid/46261 -
References () http://www.securitytracker.com/id?1024975 - () http://www.securitytracker.com/id?1024975 -
References () http://www.vupen.com/english/advisories/2011/0151 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0151 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2011/0352 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0352 - Vendor Advisory
References () http://www.zerodayinitiative.com/advisories/ZDI-11-062/ - () http://www.zerodayinitiative.com/advisories/ZDI-11-062/ -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/64797 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/64797 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12794 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12794 -

Information

Published : 2011-01-19 17:00

Updated : 2024-11-21 01:20


NVD link : CVE-2010-4435

Mitre link : CVE-2010-4435

CVE.ORG link : CVE-2010-4435


JSON object : View

Products Affected

sun

  • sunos