| Vulnerability Name: | CVE-2017-3629 (CCN-127580) | ||||||||||||
| Assigned: | 2016-12-06 | ||||||||||||
| Published: | 2017-06-19 | ||||||||||||
| Updated: | 2019-10-03 | ||||||||||||
| Summary: | Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks of this vulnerability can result in takeover of Solaris. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). | ||||||||||||
| CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 7.2 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C)
7.2 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C)
| ||||||||||||
| CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||||||
| Vulnerability Type: | CWE-119 | ||||||||||||
| Vulnerability Consequences: | Other | ||||||||||||
| References: | Source: MITRE Type: CNA CVE-2017-3629 Source: CCN Type: Oracle CVE-2017-3629 Oracle Security Alert for CVE-2017-3629 Source: CONFIRM Type: Patch, Vendor Advisory http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-3629-3757403.html Source: BID Type: Third Party Advisory, VDB Entry 99150 Source: CCN Type: BID-99150 Oracle Solaris CVE-2017-3629 Local Privilege Escalation Vulnerability Source: XF Type: UNKNOWN oracle-solaris-cve20173629(127580) Source: CCN Type: Packet Storm Security [10-15-2018] Solaris RSH Stack Clash Privilege Escalation Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [06-28-2017] Source: EXPLOIT-DB Type: UNKNOWN 42270 Source: EXPLOIT-DB Type: UNKNOWN 45625 Source: CCN Type: Qualys Security Advisory QSA - 2017-06-19 The Stack Clash | ||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
| BACK | |||||||||||||