Vulnerability Name:

CVE-2008-2121 (CCN-42264)

Assigned:2008-05-06
Published:2008-05-06
Updated:2018-10-30
Summary:The TCP implementation in Sun Solaris 8, 9, and 10 allows remote attackers to cause a denial of service (CPU consumption and new connection timeouts) via a TCP SYN flood attack.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:7.8 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
5.8 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-16
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2008-2121

Source: CCN
Type: SA30125
Avaya CMS Solaris TCP Implementation SYN Flood Denial of Service

Source: SECUNIA
Type: UNKNOWN
30125

Source: CCN
Type: SA30131
Sun Solaris TCP Implementation SYN Flood Denial of Service

Source: SECUNIA
Type: Vendor Advisory
30131

Source: CCN
Type: SECTRACK ID: 1019989
Solaris TCP SYN Attack Protection Bug Lets Remote Users Deny Service

Source: SUNALERT
Type: UNKNOWN
200864

Source: CCN
Type: Sun Alert ID: 200864
Security Vulnerability in the TCP Implementation of Solaris Systems May Allow a Denial of Service When Accepting New Connections While Undergoing a TCP "SYN Flood" Attack

Source: CONFIRM
Type: UNKNOWN
http://support.avaya.com/elmodocs2/security/ASA-2008-206.htm

Source: CCN
Type: ASA-2008-206
Security Vulnerability in the TCP Implementation of Solaris Systems (Sun 200864)

Source: CCN
Type: NORTEL BULLETIN ID: 2008008915, Rev 1
Nortel Response to Sun Alert 200864 - Solaris DoS Under a TCP "SYN Flood" Attack

Source: CCN
Type: OSVDB ID: 44936
Solaris TCP Implementation SYN Flood Remote DoS

Source: BID
Type: Patch
29089

Source: CCN
Type: BID-29089
Sun Solaris TCP SYN Flooding Remote Denial of Service Vulnerability

Source: SECTRACK
Type: UNKNOWN
1019989

Source: VUPEN
Type: UNKNOWN
ADV-2008-1453

Source: VUPEN
Type: UNKNOWN
ADV-2008-1585

Source: XF
Type: UNKNOWN
sunsolaris-tcp-dos(42264)

Source: XF
Type: UNKNOWN
sunsolaris-tcp-dos(42264)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:sun:sunos:5.8:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.9:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.10:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:sun:solaris:8::x86:*:*:*:*:*
  • OR cpe:/o:sun:solaris:8::sparc:*:*:*:*:*
  • OR cpe:/o:sun:solaris:9::x86:*:*:*:*:*
  • OR cpe:/o:sun:solaris:10::sparc:*:*:*:*:*
  • OR cpe:/o:sun:solaris:10::x86:*:*:*:*:*
  • OR cpe:/o:sun:solaris:9::sparc:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    sun sunos 5.8
    sun sunos 5.9
    sun sunos 5.10
    sun solaris 8
    sun solaris 8
    sun solaris 9
    sun solaris 10
    sun solaris 10
    sun solaris 9