Executive Summary

Summary
Title Sun Alert 200864 Security Vulnerability in the TCP Implementation of Solaris Systems May Allow a Denial of Service When Accepting New Connections While Undergoing a TCP "SYN Flood" Attack
Informations
Name SUN-200864 First vendor Publication 2008-05-06
Vendor Sun Last vendor Modification 2008-05-06
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:C)
Cvss Base Score 7.8 Attack Range Network
Cvss Impact Score 6.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Product: Solaris 8 Operating System, Solaris 9 Operating System, Solaris 10 Operating System


A security vulnerability in the TCP implementation of Solaris 8, 9 and 10 may allow a remote unprivileged user to cause a Solaris system which is undergoing a "TCP SYN" flood condition to be slow to accept new network connections.?? Such network connections may time out without establishing a connection.?? This would lead to a Denial of Service (DoS) to the network services provided by that system. In addition, a uniprocessor system may also experience overall slowdown due to high CPU usage, resulting in a Denial of Service to the system as a whole.

State: Resolved
First released: 06-May-2008

Original Source

Url : http://blogs.sun.com/security/entry/sun_alert_200864_security_vulnerability

CAPEC : Common Attack Pattern Enumeration & Classification

Id Name
CAPEC-2 Inducing Account Lockout
CAPEC-82 Violating Implicit Assumptions Regarding XML Content (aka XML Denial of Servi...
CAPEC-147 XML Ping of Death
CAPEC-228 Resource Depletion through DTD Injection in a SOAP Message

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-16 Configuration

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 3

Open Source Vulnerability Database (OSVDB)

Id Description
44936 Solaris TCP Implementation SYN Flood Remote DoS

Sun Solaris contains a flaw that may allow a remote denial of service. The issue is triggered when a hosts 'tcp_conn_req_max_q0' tunable setting is set higher than 1024 and the host is undergoing a SYN flood attack, and will result in loss of availability for the platform.

Information Assurance Vulnerability Management (IAVM)

Date Description
2008-05-29 IAVM : 2008-T-0022 - Sun Solaris TCP Implementation SYN Flood Denial of Service
Severity : Category I - VMSKEY : V0016026

Nessus® Vulnerability Scanner

Date Description
2007-10-12 Name : The remote host is missing Sun Security Patch number 120012-14
File : solaris10_x86_120012.nasl - Type : ACT_GATHER_INFO
2007-09-25 Name : The remote host is missing Sun Security Patch number 120011-14
File : solaris10_120011.nasl - Type : ACT_GATHER_INFO
2006-08-21 Name : The remote host is missing Sun Security Patch number 119435-29
File : solaris9_x86_119435.nasl - Type : ACT_GATHER_INFO
2004-11-18 Name : The remote host is missing Sun Security Patch number 114344-43
File : solaris9_114344.nasl - Type : ACT_GATHER_INFO
2004-11-02 Name : The remote host is missing Sun Security Patch number 116965-34
File : solaris8_116965.nasl - Type : ACT_GATHER_INFO
2004-11-02 Name : The remote host is missing Sun Security Patch number 116966-33
File : solaris8_x86_116966.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2013-02-06 19:08:11
  • Multiple Updates