This CPE summary could be partial or incomplete. Please contact us for a detailed listing.


Vendor Sun First view 2001-12-31
Product Solaris Last view 2008-06-16
Version 8.0 Type Os
Update unkown  
Edition x86  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
CPE Product cpe:2.3:o:sun:solaris

Activity : Overall

Related : CVE

  Date Alert Description
7.2 2008-06-16 CVE-2008-2710

Integer signedness error in the ip_set_srcfilter function in the IP Multicast Filter in uts/common/inet/ip/ip_multi.c in the kernel in Sun Solaris 10 and OpenSolaris before snv_92 allows local users to execute arbitrary code in other Solaris Zones via an SIOCSIPMSFILTER IOCTL request with a large value of the imsf->imsf_numsrc field, which triggers an out-of-bounds write of kernel memory. NOTE: this was reported as an integer overflow, but the root cause involves the bypass of a signed comparison.

10 2001-12-31 CVE-2001-1583

lpd daemon (in.lpd) in Solaris 8 and earlier allows remote attackers to execute arbitrary commands via a job request with a crafted control file that is not properly handled when lpd invokes a mail program. NOTE: this might be the same vulnerability as CVE-2000-1220.

7.2 2001-12-31 CVE-2001-1582

Buffer overflow in the LDAP naming services library (libsldap) in Sun Solaris 8 allows local users to execute arbitrary code via a long LDAP_OPTIONS environment variable to a privileged program that uses libsldap.

CWE : Common Weakness Enumeration

50% (1) CWE-189 Numeric Errors
50% (1) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

Open Source Vulnerability Database (OSVDB)

id Description
46193 Solaris Kernel SIOCSIPMSFILTER IOCTL Request IP Multicast Filter Local Privil...
45904 Solaris LDAP Naming Services Library (libsldap) LDAP_OPTIONS Environment Vari...
15131 Solaris in.lpd Crafted Job Request Arbitrary Remote Command Execution

Snort® IPS/IDS

Date Description
2014-01-10 Oracle Solaris LPD overflow attempt
RuleID : 3527 - Type : OS-SOLARIS - Revision : 13

Nessus® Vulnerability Scanner

id Description
2003-04-03 Name: The remote lpd daemon is vulnerable to arbitrary command execution.
File: solaris_lpd_env_cmd_exec.nasl - Type: ACT_DESTRUCTIVE_ATTACK