CVE-2020-2771

Vulnerability in the Oracle Solaris product of Oracle Systems (component: Whodo). Supported versions that are affected are 10 and 11. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Solaris accessible data. CVSS 3.0 Base Score 2.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:N/A:N).
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*

History

21 Nov 2024, 05:26

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/157282/Oracle-Solaris-11.x-10-whodo-w-Buffer-Overflow.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/157282/Oracle-Solaris-11.x-10-whodo-w-Buffer-Overflow.html - Exploit, Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2020/Apr/25 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2020/Apr/25 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2020/04/15/3 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2020/04/15/3 - Mailing List, Third Party Advisory
References () https://www.oracle.com/security-alerts/cpuapr2020.html - Vendor Advisory () https://www.oracle.com/security-alerts/cpuapr2020.html - Vendor Advisory

Information

Published : 2020-04-15 14:15

Updated : 2024-11-21 05:26


NVD link : CVE-2020-2771

Mitre link : CVE-2020-2771

CVE.ORG link : CVE-2020-2771


JSON object : View

Products Affected

oracle

  • solaris