Vulnerability Name: | CVE-2008-1095 (CCN-40473) | ||||||||
Assigned: | 2008-02-08 | ||||||||
Published: | 2008-02-08 | ||||||||
Updated: | 2018-10-30 | ||||||||
Summary: | Unspecified vulnerability in the Internet Protocol (IP) implementation in Sun Solaris 8, 9, and 10 allows remote attackers to bypass intended firewall policies or cause a denial of service (panic) via unknown vectors, possibly related to ICMP packets and IP fragment reassembly. | ||||||||
CVSS v3 Severity: | 3.5 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L)
| ||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:C) 5.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:C/E:U/RL:OF/RC:C)
3.0 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-noinfo CWE-264 | ||||||||
Vulnerability Consequences: | Denial of Service | ||||||||
References: | Source: MITRE Type: CNA CVE-2008-1095 Source: CCN Type: SA29100 Sun Solaris Firewall Security Bypass and Denial of Service Source: SECUNIA Type: Vendor Advisory 29100 Source: CCN Type: SA29379 Avaya CMS Solaris Firewall Security Bypass and Denial of Service Source: SECUNIA Type: Vendor Advisory 29379 Source: CCN Type: Sun Alert ID: 200183 Security Vulnerability May Allow Firewall Compromise or Creation of Denial of Service (DoS) Condition Source: SUNALERT Type: Patch 200183 Source: CONFIRM Type: UNKNOWN http://support.avaya.com/elmodocs2/security/ASA-2008-119.htm Source: CCN Type: OSVDB ID: 42155 Solaris ip(7P) Crafted Packets Firewall Security Policy Bypass Source: CCN Type: OSVDB ID: 42156 Solaris ip(7P) Crafted Packets Remote DoS Source: BID Type: Patch 27967 Source: CCN Type: BID-27967 Sun Solaris Internet Protocol 'ip(7P)' Security Bypass and Denial Of Service Vulnerability Source: VUPEN Type: Vendor Advisory ADV-2008-0645 Source: XF Type: UNKNOWN solaris-ip-dos(40473) Source: XF Type: UNKNOWN solaris-ip-dos(40473) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:5511 | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |