The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of OpenSolaris

computer vulnerability announce CVE-2012-0094 CVE-2012-0096 CVE-2012-0097

Solaris: several vulnerabilities of January 2012

Synthesis of the vulnerability

Several vulnerabilities of Solaris are corrected by the CPU of January 2012.
Impacted products: OpenSolaris, Solaris, Trusted Solaris.
Severity: 3/4.
Consequences: user access/rights, data reading, data creation/edition, data deletion, denial of service on server, denial of service on service.
Provenance: intranet client.
Number of vulnerabilities in this bulletin: 8.
Creation date: 18/01/2012.
Identifiers: BID-51475, BID-51476, BID-51487, BID-51490, BID-51494, BID-51498, BID-51499, BID-51500, CERTA-2012-AVI-102, cpujan2012, CVE-2012-0094, CVE-2012-0096, CVE-2012-0097, CVE-2012-0098, CVE-2012-0099, CVE-2012-0100, CVE-2012-0103, CVE-2012-0109, VIGILANCE-VUL-11297.

Description of the vulnerability

A Critical Patch Update corrects several vulnerabilities of Solaris.

An attacker can use a vulnerability of TCP/IP, in order to create a denial of service. [severity:3/4; BID-51476, CERTA-2012-AVI-102, CVE-2012-0094]

An attacker can use a vulnerability of Kerberos, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-51475, CVE-2012-0100]

An attacker can use a vulnerability of RPC, in order to create a denial of service. [severity:2/4; BID-51490, CVE-2012-0096]

An attacker can use a vulnerability of Kernel, in order to create a denial of service. [severity:2/4; BID-51494, CVE-2012-0103]

An attacker can use a vulnerability of TCP/IP, in order to obtain information, or to create a denial of service. [severity:2/4; BID-51487, CVE-2012-0109]

An attacker can use a vulnerability of SSH, in order to create a denial of service. [severity:2/4; BID-51500, CVE-2012-0099]

An attacker can use a vulnerability of ksh93 Shell, in order to obtain information. [severity:1/4; BID-51498, CVE-2012-0097]

An attacker can use a vulnerability of Kernel, in order to create a denial of service. [severity:1/4; BID-51499, CVE-2012-0098]
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2011-4313

BIND 9: denial of service via recursion

Synthesis of the vulnerability

An attacker can use a malicious query on a recursive BIND DNS server, with an invalid value in its cache, in order to stop it.
Impacted products: Debian, BIG-IP Hardware, TMOS, Fedora, FreeBSD, HP-UX, AIX, BIND, Mandriva Linux, NetBSD, NLD, OpenBSD, OpenSolaris, openSUSE, Solaris, Trusted Solaris, RHEL, SLES.
Severity: 2/4.
Consequences: denial of service on service.
Provenance: intranet client.
Creation date: 16/11/2011.
Revision date: 17/11/2011.
Identifiers: BID-50690, c03105548, CERTA-2011-AVI-645, CVE-2011-4313, DSA-2347-1, FEDORA-2011-16002, FEDORA-2011-16036, FEDORA-2011-16057, FreeBSD-SA-11:06.bind, HPSBUX02729, IV09491, IV09978, IV10049, IV11106, IV11742, IV11743, IV11744, MDVSA-2011:176, MDVSA-2011:176-1, MDVSA-2011:176-2, NetBSD-SA2011-009, openSUSE-SU-2011:1272-1, RHSA-2011:1458-01, RHSA-2011:1459-01, RHSA-2011:1496-01, sol14204, SSRT100687, SUSE-SU-2011:1268-1, SUSE-SU-2011:1270-1, SUSE-SU-2011:1270-2, SUSE-SU-2011:1270-3, VIGILANCE-VUL-11162, VU#606539.

Description of the vulnerability

The BIND DNS server can be configured in recursive mode, in order to resolve external addresses requested by internal clients. Replies of external DNS servers are kept in a cache, and this cache is later searched to answer future queries.

The DNSSEC protocol is used to authenticate data of DNS zones. The NSEC and NSEC3 records are used to indicate that a name does not exist (NXDOMAIN, Non-Existent Domain, NX). These records thus have no data (rdata) associated.

An attacker can, using another bug, force the cache of a recursive DNS server to contain a NX record with rdata. Then when the client requests this record, the query_addadditional2() function of the query.c file calls the macro INSIST(!dns_rdataset_isassociated(sigrdataset)), because a rdata is associated to a NC record. The INSIST macro stops the daemon.

In order to exploit this vulnerability, the attacker can be on the internal network, and can request an invalid resolution. He can also create an HTML document containing images located on a server with a malicious name, and can then invite the victim to display this HTML page. He can also send an email from an malicious server name, which will be resolved by the messaging server.

An attacker can therefore use a malicious query on a recursive BIND DNS server, with an invalid value in its cache, in order to stop it.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2011-2445 CVE-2011-2450 CVE-2011-2451

Adobe Flash Player: several vulnerabilities

Synthesis of the vulnerability

Several Adobe Flash Player vulnerabilities can be used by an attacker to execute code or to create a denial of service.
Impacted products: Flash Player, Acrobat, OpenSolaris, openSUSE, Solaris, RHEL, SUSE Linux Enterprise Desktop.
Severity: 4/4.
Consequences: user access/rights, client access/rights, data reading.
Provenance: document.
Number of vulnerabilities in this bulletin: 12.
Creation date: 14/11/2011.
Identifiers: APSB11-28, APSB12-01, BID-50618, BID-50619, BID-50620, BID-50621, BID-50622, BID-50623, BID-50624, BID-50625, BID-50626, BID-50627, BID-50628, BID-50629, CERTA-2011-AVI-630, CERTA-2011-AVI-642, CVE-2011-2445, CVE-2011-2450, CVE-2011-2451, CVE-2011-2452, CVE-2011-2453, CVE-2011-2454, CVE-2011-2455, CVE-2011-2456, CVE-2011-2457, CVE-2011-2458, CVE-2011-2459, CVE-2011-2460, openSUSE-SU-2011:1240-1, openSUSE-SU-2011:1240-2, RHSA-2011:1445-01, SUSE-SA:2011:043, SUSE-SU-2011:1244-1, VIGILANCE-VUL-11153.

Description of the vulnerability

Several Adobe Flash Player vulnerabilities were announced.

An attacker can generate a memory corruption, in order to execute code. [severity:4/4; BID-50625, CERTA-2011-AVI-630, CERTA-2011-AVI-642, CVE-2011-2445]

An attacker can generate a heap memory corruption, in order to execute code. [severity:4/4; BID-50619, CVE-2011-2450]

An attacker can generate a memory corruption, in order to execute code. [severity:4/4; BID-50623, CVE-2011-2451]

An attacker can generate a memory corruption, in order to execute code. [severity:4/4; BID-50622, CVE-2011-2452]

An attacker can generate a memory corruption, in order to execute code. [severity:4/4; BID-50618, CVE-2011-2453]

An attacker can generate a memory corruption, in order to execute code. [severity:4/4; BID-50626, CVE-2011-2454]

An attacker can generate a memory corruption, in order to execute code. [severity:4/4; BID-50627, CVE-2011-2455]

An attacker can generate a buffer overflow, in order to execute code. [severity:4/4; BID-50624, CVE-2011-2456]

An attacker can generate a stack overflow, in order to execute code. [severity:4/4; BID-50621, CVE-2011-2457]

An attacker can access to data of another site via Internet Explorer. [severity:2/4; BID-50629, CVE-2011-2458]

An attacker can generate a memory corruption via SAlign, in order to execute code. [severity:4/4; BID-50620, CVE-2011-2459]

An attacker can generate a memory corruption, in order to execute code. [severity:4/4; BID-50628, CVE-2011-2460]
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2011-2286 CVE-2011-2292 CVE-2011-2304

Solaris: several vulnerabilities of October 2011

Synthesis of the vulnerability

Several vulnerabilities of Solaris are corrected by the CPU of October 2011.
Impacted products: OpenSolaris, Solaris, Trusted Solaris.
Severity: 3/4.
Consequences: administrator access/rights, privileged access/rights, user access/rights, data reading, data creation/edition, data deletion, denial of service on server, denial of service on service.
Provenance: intranet client.
Number of vulnerabilities in this bulletin: 15.
Creation date: 19/10/2011.
Identifiers: BID-50201, BID-50214, BID-50235, BID-50244, BID-50251, BID-50254, BID-50255, BID-50257, BID-50266, BID-50269, BID-50270, cpuoct2011, CVE-2011-2286, CVE-2011-2292, CVE-2011-2304, CVE-2011-2311, CVE-2011-2312, CVE-2011-2313, CVE-2011-3508, CVE-2011-3515, CVE-2011-3534, CVE-2011-3535, CVE-2011-3536, CVE-2011-3537, CVE-2011-3539, CVE-2011-3542, CVE-2011-3543, VIGILANCE-VUL-11075.

Description of the vulnerability

A Critical Patch Update corrects several vulnerabilities of Solaris.

An attacker can use a vulnerability of LDAP library, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-50201, CVE-2011-3508]

An attacker can use a vulnerability of iSCSI, in order to create a denial of service. [severity:3/4; BID-50214, CVE-2011-3543]

An attacker can use a vulnerability of Process File System (procfs), in order to create a denial of service. [severity:3/4; BID-50235, CVE-2011-3515]

An attacker can use a vulnerability of RPC statd, in order to create a denial of service. [severity:2/4; BID-50251, CVE-2011-3534]

An attacker can use a vulnerability of RPC rquotad, in order to create a denial of service. [severity:2/4; BID-50255, CVE-2011-3535]

An attacker can use a vulnerability of Kernel/Filesystem, in order to create a denial of service. [severity:2/4; CVE-2011-3537]

An attacker can use a vulnerability of Kernel/Performance Counter BackEnd Module (pcbe), in order to create a denial of service. [severity:3/4; BID-50244, CVE-2011-3542]

An attacker can use a vulnerability of ZFS, in order to create a denial of service. [severity:2/4; BID-50254, CVE-2011-2313]

An attacker can use a vulnerability of Network Services Library (libnsl), in order to obtain information. [severity:2/4; BID-50257, CVE-2011-2304]

An attacker can use a vulnerability of xscreensaver, in order to obtain or alter information. [severity:2/4; CVE-2011-2292]

An attacker can use a vulnerability of ZFS, in order to create a denial of service. [severity:1/4; CVE-2011-2286]

An attacker can use a vulnerability of libdtrace, in order to create a denial of service. [severity:1/4; CVE-2011-3536]

An attacker can use a vulnerability of ZFS, in order to create a denial of service. [severity:1/4; BID-50266, CVE-2011-2311]

An attacker can use a vulnerability of ZFS, in order to obtain information. [severity:1/4; BID-50269, CVE-2011-2312]

An attacker can use a vulnerability of Zones, in order to create a denial of service. [severity:1/4; BID-50270, CVE-2011-3539]
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2011-2426 CVE-2011-2427 CVE-2011-2428

Adobe Flash Player: several vulnerabilities

Synthesis of the vulnerability

Several Adobe Flash Player vulnerabilities can be used by an attacker to execute code or to create a denial of service.
Impacted products: Flash Player, OpenSolaris, openSUSE, Solaris, RHEL, SUSE Linux Enterprise Desktop.
Severity: 4/4.
Consequences: user access/rights, denial of service on client.
Provenance: document.
Number of vulnerabilities in this bulletin: 6.
Creation date: 22/09/2011.
Identifiers: APSB11-26, BID-49710, BID-49714, BID-49715, BID-49716, BID-49717, BID-49718, CERTA-2011-AVI-531, CVE-2011-2426, CVE-2011-2427, CVE-2011-2428, CVE-2011-2429, CVE-2011-2430, CVE-2011-2444, openSUSE-SU-2011:1060-1, RHSA-2011:1333-01, RHSA-2011:1434-01, SUSE-SU-2011:1063-1, VIGILANCE-VUL-11003.

Description of the vulnerability

Several Adobe Flash Player vulnerabilities were announced.

An attacker can use a Cross Site Scripting, in order to take actions on a web site on a user's behalf. [severity:3/4; BID-49710, CVE-2011-2444]

An attacker can generate an overflow in AVM, in order to execute code. [severity:4/4; BID-49714, CERTA-2011-AVI-531, CVE-2011-2426]

An attacker can generate an overflow in AVM, in order to execute code. [severity:4/4; BID-49715, CVE-2011-2427]

An attacker can use a logic error, in order to execute code. [severity:4/4; BID-49716, CVE-2011-2428]

An attacker can bypass security features, in order to obtain information. [severity:2/4; BID-49718, CVE-2011-2429]

An attacker can use a logic error in the processing of streaming media, in order to execute code. [severity:4/4; BID-49717, CVE-2011-2430]
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2011-3348

Apache httpd: denial of service via mod_proxy_ajp

Synthesis of the vulnerability

When mod_proxy_ajp is used with mod_proxy_balancer, an attacker can use an unknown HTTP method, in order to create a denial of service.
Impacted products: Apache httpd, OpenView, OpenView NNM, HP-UX, Junos Space, Junos Space Network Management Platform, Mandriva Linux, OpenSolaris, RHEL, Slackware.
Severity: 2/4.
Consequences: denial of service on service.
Provenance: internet client.
Creation date: 14/09/2011.
Identifiers: BID-49616, c03011498, c03025215, CERTA-2011-AVI-516, CVE-2011-3348, HPSBMU02704, HPSBUX02707, MDVSA-2011:168, PSN-2013-02-846, RHSA-2011:1391-01, RHSA-2012:0542-01, RHSA-2012:0543-01, SSA:2011-284-01, SSRT100619, SSRT100626, VIGILANCE-VUL-10991.

Description of the vulnerability

The mod_proxy module provides a generic proxy service for Apache httpd. The mod_proxy_ajp module adds the AJP13 (Apache JServe Protocol version 1.3) support, which is used with Tomcat. The mod_proxy_balancer module is used to balance the load between several proxies.

The HTTP protocol defines a list of methods (GET, POST, etc.) which are used in queries.

The ap_proxy_ajp_request() function of the modules/proxy/mod_proxy_ajp.c file does not ignore unknown HTTP methods. However, when mod_proxy_balancer is also used, the associated proxy enters in an error state. Using several queries, an attacker can thus stop all balanced proxies.

When mod_proxy_ajp is used with mod_proxy_balancer, an attacker can therefore use an unknown HTTP method, in order to create a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2011-3192

Apache httpd: denial of service via Range or Request-Range

Synthesis of the vulnerability

An attacker can use several parallel queries using Range or Request-Range, in order to progressively use the available memory.
Impacted products: Apache httpd, CheckPoint Endpoint Security, IPSO, CheckPoint Security Gateway, CiscoWorks, Nexus by Cisco, NX-OS, Debian, BIG-IP Hardware, TMOS, Fedora, OpenView, OpenView NNM, HP-UX, Junos Space, Junos Space Network Management Platform, Mandriva Linux, ePO, OpenSolaris, openSUSE, Oracle AS, Oracle Fusion Middleware, Solaris, RHEL, Slackware, SLES.
Severity: 2/4.
Consequences: denial of service on service.
Provenance: internet client.
Creation date: 24/08/2011.
Revisions dates: 24/08/2011, 26/08/2011, 14/09/2011.
Identifiers: BID-49303, c02997184, c03011498, c03025215, CERTA-2011-AVI-493, cisco-sa-20110830-apache, CVE-2011-3192, DSA-2298-1, DSA-2298-2, FEDORA-2011-12715, HPSBMU02704, HPSBUX02702, HPSBUX02707, KB73310, MDVSA-2011:130, MDVSA-2011:130-1, openSUSE-SU-2011, openSUSE-SU-2011:0993-1, PSN-2013-02-846, RHSA-2011:1245-01, RHSA-2011:1294-01, RHSA-2011:1300-01, RHSA-2011:1329-01, RHSA-2011:1330-01, RHSA-2011:1369-01, sk65222, SSA:2011-252-01, SSRT100606, SSRT100619, SSRT100626, SUSE-SU-2011:1000-1, SUSE-SU-2011:1007-1, SUSE-SU-2011:1010-1, SUSE-SU-2011:1215-1, SUSE-SU-2011:1216-1, VIGILANCE-VUL-10944, VU#405811.

Description of the vulnerability

The Range header defined in the HTTP protocol indicates a byte range that server should return. For example, to obtain byte between 10 to 30 and 50 to 60:
  Range: bytes=10-30,50-60
The Request-Range header is the obsolete name of Range.

Apache processes the following objects:
 - bucket: an abstract storage area (memory, file, etc.).
 - brigade: a chained list of buckets

When Apache httpd receives a query containing the Range header, it stores each range in a brigade. However, if the range list is large, this brigade consumes a lot of memory.

An attacker can therefore use several parallel queries using Range or Request-Range, in order to progressively use the available memory.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2011-2896

CUPS, GIMP: memory corruption via GIF LZW

Synthesis of the vulnerability

An attacker can create a malicious GIF image, in order to execute code when it is uncompressed.
Impacted products: CUPS, Debian, Fedora, GIMP, Mandriva Linux, OpenSolaris, openSUSE, Solaris, RHEL, SUSE Linux Enterprise Desktop, SLES.
Severity: 2/4.
Consequences: user access/rights, denial of service on client.
Provenance: document.
Creation date: 11/08/2011.
Identifiers: 727800, BID-49148, CVE-2011-2896, DSA-2354-1, DSA-2426-1, FEDORA-2011-10782, FEDORA-2011-10788, FEDORA-2011-11221, FEDORA-2011-11305, FEDORA-2011-11318, MDVSA-2011:146, MDVSA-2011:167, openSUSE-SU-2011:1152-1, RHSA-2011:1635-03, RHSA-2012:0302-03, RHSA-2012:1180-01, RHSA-2012:1181-01, SUSE-SU-2011:1136-1, SUSE-SU-2011:1136-2, SUSE-SU-2011:1141-1, SUSE-SU-2011:1149-1, SUSE-SU-2011:1153-1, VIGILANCE-VUL-10919.

Description of the vulnerability

GIF images are compressed with the LZW (Lempel-Ziv-Welch) algorithm.

The LZW algorithm uses an array containing string fragments. This array is progressively filled with the newly compressed fragments. Indexes of this array are stored in the compressed file. In order to uncompresss the file, the algorithm reads the index (from the compressed file) and stores the fragment associated in the uncompressed file. When data follow the "KwKwK" pattern, where K is a character and "w" is a fragment (word), the array index is the first free (fill is in progress) position of the array. It is a known special case, for which it is allowed to use this empty position.

However, CUPS and GIMP incorrectly process the "KwKwK" special case, and allow indexes which are greater than this first empty position. This leads to a memory corruption.

An attacker can therefore create a malicious GIF image, in order to execute code when it is uncompressed.

This vulnerability has the same origin as VIGILANCE-VUL-10918.
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2011-2130 CVE-2011-2134 CVE-2011-2135

Adobe Flash Player: several vulnerabilities

Synthesis of the vulnerability

Several Adobe Flash Player vulnerabilities can be used by an attacker to execute code or to create a denial of service.
Impacted products: Flash Player, OpenSolaris, openSUSE, Solaris, RHEL, SUSE Linux Enterprise Desktop.
Severity: 4/4.
Consequences: user access/rights, client access/rights, data reading, denial of service on client.
Provenance: document.
Number of vulnerabilities in this bulletin: 13.
Creation date: 10/08/2011.
Identifiers: APSB11-21, BID-49073, BID-49074, BID-49075, BID-49076, BID-49077, BID-49079, BID-49080, BID-49081, BID-49082, BID-49083, BID-49084, BID-49085, BID-49086, BID-49186, CERTA-2011-AVI-448, CVE-2011-2130, CVE-2011-2134, CVE-2011-2135, CVE-2011-2136, CVE-2011-2137, CVE-2011-2138, CVE-2011-2139, CVE-2011-2140, CVE-2011-2414, CVE-2011-2415, CVE-2011-2416, CVE-2011-2417, CVE-2011-2424, CVE-2011-2425, openSUSE-SU-2011:0897-1, RHSA-2011:1144-01, RHSA-2011:1434-01, SUSE-SA:2011:033, SUSE-SU-2011:0894-1, VIGILANCE-VUL-10910, ZDI-11-253, ZDI-11-276.

Description of the vulnerability

Several Adobe Flash Player vulnerabilities were announced.

An attacker can use a buffer overflow, in order to execute code. [severity:4/4; BID-49073, CERTA-2011-AVI-448, CVE-2011-2130]

An attacker can use a buffer overflow, in order to execute code. [severity:4/4; BID-49074, CVE-2011-2134]

An attacker can corrupt the memory in the ActionScript functions of the flash.display class, in order to execute code. [severity:4/4; BID-49082, CVE-2011-2135]

An attacker can use an integer overflow in ActionScript functions, in order to execute code. [severity:4/4; BID-49079, CVE-2011-2136]

An attacker can use a buffer overflow in the ActionScript FileReference method, in order to execute code. [severity:4/4; BID-49075, CVE-2011-2137]

An attacker can use an integer overflow in BitmapData.scroll, in order to execute code. [severity:4/4; BID-49080, CVE-2011-2138, ZDI-11-253]

An attacker can use a Cross Site Scripting, in order to obtain information, or to execute script code. [severity:2/4; BID-49086, CVE-2011-2139]

An attacker can corrupt the memory of the MP4 sequenceParameterSetNALUnit component, in order to execute code. [severity:4/4; BID-49083, CVE-2011-2140, ZDI-11-276]

An attacker can use a buffer overflow, in order to execute code. [severity:4/4; BID-49076, CVE-2011-2414]

An attacker can use a buffer overflow, in order to execute code. [severity:4/4; BID-49077, CVE-2011-2415]

An attacker can use an integer overflow in ActionScript functions, in order to execute code. [severity:4/4; BID-49081, CVE-2011-2416]

An attacker can corrupt the memory, in order to execute code. [severity:4/4; BID-49084, CVE-2011-2417]

An attacker can corrupt the memory, in order to execute code. [severity:4/4; BID-49085, CVE-2011-2425]
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2011-2245 CVE-2011-2249 CVE-2011-2258

Solaris: several vulnerabilities of July 2011

Synthesis of the vulnerability

Several vulnerabilities of Solaris are corrected by the CPU of July 2011.
Impacted products: OpenSolaris, Solaris, Trusted Solaris.
Severity: 3/4.
Consequences: administrator access/rights, privileged access/rights, user access/rights, data reading, data creation/edition, data deletion, denial of service on server, denial of service on service.
Provenance: intranet client.
Number of vulnerabilities in this bulletin: 15.
Creation date: 20/07/2011.
Identifiers: BID-48753, BID-48770, BID-48772, BID-48774, BID-48775, BID-48779, BID-48780, BID-48785, BID-48786, BID-48787, BID-48788, BID-48790, BID-48791, BID-48795, BID-48798, cpujuly2011, CVE-2011-2245, CVE-2011-2249, CVE-2011-2258, CVE-2011-2259, CVE-2011-2285, CVE-2011-2287, CVE-2011-2289, CVE-2011-2290, CVE-2011-2291, CVE-2011-2293, CVE-2011-2294, CVE-2011-2295, CVE-2011-2296, CVE-2011-2297, CVE-2011-2298, NGS00042, VIGILANCE-VUL-10857.

Description of the vulnerability

A Critical Patch Update corrects several vulnerabilities of Solaris.

An attacker can use a vulnerability of fingerd, in order to create a denial of service. [severity:3/4; BID-48753, CVE-2011-2287]

An attacker can use a vulnerability of SSH, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-48770, CVE-2011-2245]

An attacker can use a vulnerability of Installer, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-48775, CVE-2011-2285]

An attacker can use a vulnerability of Oracle Solaris Cluster Data Service for WebLogic Server, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-48774, CVE-2011-2297]

An attacker can use a vulnerability of TCP/IP, in order to create a denial of service. [severity:3/4; BID-48772, CVE-2011-2249]

An attacker can use a vulnerability of SSH, in order to create a denial of service. [severity:2/4; BID-48780, CVE-2011-2294]

An attacker can use a vulnerability of KSSL, in order to create a denial of service. [severity:3/4; BID-48779, CVE-2011-2298]

An attacker can use a vulnerability of Kernel/SCTP, in order to create a denial of service. [severity:2/4; BID-48785, CVE-2011-2296]

An attacker can use a vulnerability of Kernel/sockfs, in order to create a denial of service. [severity:2/4; BID-48786, CVE-2011-2290]

An attacker can use a vulnerability of UFS, in order to create a denial of service. [severity:2/4; BID-48787, CVE-2011-2259]

An attacker can use a vulnerability of Zones, in order to create a denial of service. [severity:2/4; BID-48788, CVE-2011-2293]

An attacker can use a vulnerability of Driver/USB, in order to create a denial of service. [severity:2/4; BID-48790, CVE-2011-2295, NGS00042]

An attacker can use a vulnerability of rksh, in order to obtain information, to alter information, or to create a denial of service. [severity:2/4; BID-48791, CVE-2011-2258]

An attacker can use a vulnerability of LiveUpgrade, in order to alter information, or to create a denial of service. [severity:1/4; BID-48795, CVE-2011-2289]

An attacker can use a vulnerability of Trusted Extensions, in order to obtain information. [severity:1/4; BID-48798, CVE-2011-2291]
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.