CVE-2020-14871

Vulnerability in the Oracle Solaris product of Oracle Systems (component: Pluggable authentication module). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Solaris. Note: This CVE is not exploitable for Solaris 11.1 and later releases, and ZFSSA 8.7 and later releases, thus the CVSS Base Score is 0.0. CVSS 3.1 Base Score 10.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
References
Link Resource
http://packetstormsecurity.com/files/159961/SunSSH-Solaris-10-x86-Remote-Root.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/160510/Solaris-SunSSH-11.0-x86-libpam-Remote-Root.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/160609/Oracle-Solaris-SunSSH-PAM-parse_user_name-Buffer-Overflow.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/163232/Solaris-SunSSH-11.0-Remote-Root.html Exploit Third Party Advisory VDB Entry
http://www.openwall.com/lists/oss-security/2021/03/03/1 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2024/07/03/3 Mailing List Patch
https://www.oracle.com/security-alerts/cpuoct2020.html Vendor Advisory
http://packetstormsecurity.com/files/159961/SunSSH-Solaris-10-x86-Remote-Root.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/160510/Solaris-SunSSH-11.0-x86-libpam-Remote-Root.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/160609/Oracle-Solaris-SunSSH-PAM-parse_user_name-Buffer-Overflow.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/163232/Solaris-SunSSH-11.0-Remote-Root.html Exploit Third Party Advisory VDB Entry
http://www.openwall.com/lists/oss-security/2021/03/03/1 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2024/07/03/3 Mailing List Patch
https://www.oracle.com/security-alerts/cpuoct2020.html Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:oracle:solaris:*:*:*:*:*:*:*:*
cpe:2.3:o:oracle:solaris:9:*:*:*:*:*:*:*

History

21 Nov 2024, 05:04

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/159961/SunSSH-Solaris-10-x86-Remote-Root.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/159961/SunSSH-Solaris-10-x86-Remote-Root.html - Third Party Advisory, VDB Entry
References () http://packetstormsecurity.com/files/160510/Solaris-SunSSH-11.0-x86-libpam-Remote-Root.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/160510/Solaris-SunSSH-11.0-x86-libpam-Remote-Root.html - Exploit, Third Party Advisory, VDB Entry
References () http://packetstormsecurity.com/files/160609/Oracle-Solaris-SunSSH-PAM-parse_user_name-Buffer-Overflow.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/160609/Oracle-Solaris-SunSSH-PAM-parse_user_name-Buffer-Overflow.html - Exploit, Third Party Advisory, VDB Entry
References () http://packetstormsecurity.com/files/163232/Solaris-SunSSH-11.0-Remote-Root.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/163232/Solaris-SunSSH-11.0-Remote-Root.html - Exploit, Third Party Advisory, VDB Entry
References () http://www.openwall.com/lists/oss-security/2021/03/03/1 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2021/03/03/1 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2024/07/03/3 - Mailing List, Patch () http://www.openwall.com/lists/oss-security/2024/07/03/3 - Mailing List, Patch
References () https://www.oracle.com/security-alerts/cpuoct2020.html - Vendor Advisory () https://www.oracle.com/security-alerts/cpuoct2020.html - Vendor Advisory

14 Aug 2024, 20:09

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2024/07/03/3 - () http://www.openwall.com/lists/oss-security/2024/07/03/3 - Mailing List, Patch

03 Jul 2024, 09:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/07/03/3 -

Information

Published : 2020-10-21 15:15

Updated : 2024-11-21 05:04


NVD link : CVE-2020-14871

Mitre link : CVE-2020-14871

CVE.ORG link : CVE-2020-14871


JSON object : View

Products Affected

oracle

  • solaris
CWE
CWE-787

Out-of-bounds Write