Show filters
60 Total Results
Displaying 51-60 of 60
Sort by:
Attacker Value
Unknown
CVE-2008-5661
Disclosure Date: December 17, 2008 (last updated October 04, 2023)
The IPv4 Forwarding feature in Sun Solaris 10 and OpenSolaris snv_47 through snv_82, with certain patches installed, allows remote attackers to cause a denial of service (panic) via unknown vectors that trigger a NULL pointer dereference.
0
Attacker Value
Unknown
CVE-2008-5133
Disclosure Date: November 18, 2008 (last updated October 04, 2023)
ipnat in IP Filter in Sun Solaris 10 and OpenSolaris before snv_96, when running on a DNS server with Network Address Translation (NAT) configured, improperly changes the source port of a packet when the destination port is the DNS port, which allows remote attackers to bypass an intended CVE-2008-1447 protection mechanism and spoof the responses to DNS queries sent by named.
0
Attacker Value
Unknown
CVE-2008-5111
Disclosure Date: November 17, 2008 (last updated October 04, 2023)
Unspecified vulnerability in the socket function in Sun Solaris 10 and OpenSolaris snv_57 through snv_91, when InfiniBand hardware is not installed, allows local users to cause a denial of service (panic) via unknown vectors, related to the socksdpv_close function.
0
Attacker Value
Unknown
CVE-2008-5010
Disclosure Date: November 10, 2008 (last updated October 04, 2023)
in.dhcpd in the DHCP implementation in Sun Solaris 8 through 10, and OpenSolaris before snv_103, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via unknown DHCP requests related to the "number of offers," aka Bug ID 6713805.
0
Attacker Value
Unknown
CVE-2008-4160
Disclosure Date: September 22, 2008 (last updated October 04, 2023)
Unspecified vulnerability in the UFS module in Sun Solaris 8 through 10 and OpenSolaris allows local users to cause a denial of service (NULL pointer dereference and kernel panic) via unknown vectors related to the Solaris Access Control List (ACL) implementation.
0
Attacker Value
Unknown
CVE-2008-3875
Disclosure Date: September 02, 2008 (last updated October 04, 2023)
The kernel in Sun Solaris 8 through 10 and OpenSolaris before snv_90 allows local users to bypass chroot, zones, and the Solaris Trusted Extensions multi-level security policy, and establish a covert communication channel, via unspecified vectors involving system calls.
0
Attacker Value
Unknown
CVE-2008-3838
Disclosure Date: August 27, 2008 (last updated October 04, 2023)
Unspecified vulnerability in the NFS Remote Procedure Calls (RPC) zones implementation in Sun Solaris 10 and OpenSolaris before snv_88 allows local administrators of non-global zones to read and modify NFS traffic for arbitrary non-global zones, possibly leading to file modifications or a denial of service.
0
Attacker Value
Unknown
CVE-2008-3839
Disclosure Date: August 27, 2008 (last updated October 04, 2023)
Unspecified vulnerability in the NFS module in the kernel in Sun Solaris 10 and OpenSolaris snv_59 through snv_87, when configured as an NFS server without the nodevices option, allows local users to cause a denial of service (panic) via unspecified vectors.
0
Attacker Value
Unknown
CVE-2008-3666
Disclosure Date: August 13, 2008 (last updated October 04, 2023)
Unspecified vulnerability in Sun Solaris 10 and OpenSolaris before snv_96 allows (1) context-dependent attackers to cause a denial of service (panic) via vectors involving creation of a crafted file and use of the sendfilev system call, as demonstrated by a file served by an Apache 2.2.x web server with EnableSendFile configured; and (2) local users to cause a denial of service (panic) via a call to the sendfile system call, as reachable through the sendfilev library.
0
Attacker Value
Unknown
CVE-2007-5365
Disclosure Date: October 11, 2007 (last updated October 04, 2023)
Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 through 4.2, and some other dhcpd implementations based on ISC dhcp-2, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a DHCP request specifying a maximum message size smaller than the minimum IP MTU.
0