Vulnerability Name:

CVE-2008-2710 (CCN-43068)

Assigned:2008-06-12
Published:2008-06-12
Updated:2018-10-30
Summary:Integer signedness error in the ip_set_srcfilter function in the IP Multicast Filter in uts/common/inet/ip/ip_multi.c in the kernel in Sun Solaris 10 and OpenSolaris before snv_92 allows local users to execute arbitrary code in other Solaris Zones via an SIOCSIPMSFILTER IOCTL request with a large value of the imsf->imsf_numsrc field, which triggers an out-of-bounds write of kernel memory.
Note: this was reported as an integer overflow, but the root cause involves the bypass of a signed comparison.
CVSS v3 Severity:9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.3 Medium (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.3 Medium (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-189
Vulnerability Consequences:Gain Privileges
References:Source: MITRE
Type: CNA
CVE-2008-2710

Source: CCN
Type: SA30693
Sun Solaris IP Multicast Filter Privilege Escalation

Source: SECUNIA
Type: UNKNOWN
30693

Source: CCN
Type: SECTRACK ID: 1020283
Solaris IP Multicast Filter Bug Lets Local Users Deny Service or Gain Elevated Privileges

Source: SUNALERT
Type: UNKNOWN
237965

Source: CCN
Type: Sun Alert ID: 237965
A Security Vulnerability in IP Multicast Filter processing of Sockets may lead to a system panic or possible execution of Arbitrary Code

Source: CCN
Type: ASA-2008-262
A Security Vulnerability in IP Multicast Filter processing of Sockets may lead to a system panic or possible execution of Arbitrary Code (Sun 237965)

Source: CCN
Type: OSVDB ID: 46193
Solaris Kernel SIOCSIPMSFILTER IOCTL Request IP Multicast Filter Local Privilege Escalation

Source: BID
Type: UNKNOWN
29699

Source: CCN
Type: BID-29699
Sun Solaris and OpenSolaris Local IP Multicast Filter Integer Overflow Vulnerability

Source: SECTRACK
Type: UNKNOWN
1020283

Source: CCN
Type: Trapkit Security Advisory TKADV2008-003
Sun Solaris SIOCSIPMSFILTER Kernel Integer Overflow

Source: MISC
Type: Exploit
http://www.trapkit.de/advisories/TKADV2008-003.txt

Source: VUPEN
Type: UNKNOWN
ADV-2008-1832

Source: XF
Type: UNKNOWN
solaris-ipsetsrcfilter-code-execution(43068)

Source: XF
Type: UNKNOWN
sun-solaris-ipsetsrcfilter-code-execution(43068)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:5731

Vulnerable Configuration:Configuration 1:
  • cpe:/o:sun:opensolaris:10:*:*:*:*:*:*:*
  • OR cpe:/o:sun:solaris:*:*:sparc:*:*:*:*:* (Version <= 10)
  • OR cpe:/o:sun:sunos:*:*:*:*:*:*:*:* (Version <= -)

  • Configuration CCN 1:
  • cpe:/o:sun:solaris:10::sparc:*:*:*:*:*
  • OR cpe:/o:sun:solaris:10::x86:*:*:*:*:*
  • OR cpe:/o:sun:opensolaris:build_snv_91::x86:*:*:*:*:*
  • OR cpe:/o:sun:opensolaris:build_snv_91::sparc:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:5731
    V
    A Security Vulnerability in IP Multicast Filter processing of Sockets may lead to a system panic or possible execution of Arbitrary Code
    2008-07-28
    BACK
    sun opensolaris 10
    sun solaris *
    sun sunos *
    sun solaris 10
    sun solaris 10
    sun opensolaris build_snv_91
    sun opensolaris build_snv_91