Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel RPC). For supported versions that are affected see note. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Solaris. While the vulnerability is in Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Solaris. Note: CVE-2017-3623 is assigned for "Ebbisland". Solaris 10 systems which have had any Kernel patch installed after, or updated via patching tools since 2012-01-26 are not impacted. Also, any Solaris 10 system installed with Solaris 10 1/13 (Solaris 10 Update 11) are not vulnerable. Solaris 11 is not impacted by this issue. CVSS 3.0 Base Score 10.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
References
Configurations
History
21 Nov 2024, 03:25
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/155876/EBBISLAND-EBBSHAVE-6100-09-04-1441-Remote-Buffer-Overflow.html - | |
References | () http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/97778 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1038292 - |
Information
Published : 2017-04-24 19:59
Updated : 2024-11-21 03:25
NVD link : CVE-2017-3623
Mitre link : CVE-2017-3623
CVE.ORG link : CVE-2017-3623
JSON object : View
Products Affected
oracle
- solaris
CWE