fkie_cve-2008-3549
Vulnerability from fkie_nvd
Published
2008-08-07 21:41
Modified
2024-11-21 00:49
Severity ?
Summary
Unspecified vulnerability in the pthread_mutex_reltimedlock_np API in Sun Solaris 10 and OpenSolaris before snv_90 allows local users to cause a denial of service (system hang or panic) via unknown vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sun | opensolaris | build_snv_01 | |
sun | opensolaris | build_snv_01 | |
sun | opensolaris | build_snv_02 | |
sun | opensolaris | build_snv_02 | |
sun | opensolaris | build_snv_13 | |
sun | opensolaris | build_snv_13 | |
sun | opensolaris | build_snv_19 | |
sun | opensolaris | build_snv_19 | |
sun | opensolaris | build_snv_22 | |
sun | opensolaris | build_snv_22 | |
sun | opensolaris | build_snv_39 | |
sun | opensolaris | build_snv_39 | |
sun | opensolaris | build_snv_47 | |
sun | opensolaris | build_snv_47 | |
sun | opensolaris | build_snv_64 | |
sun | opensolaris | build_snv_64 | |
sun | opensolaris | build_snv_79b | |
sun | opensolaris | build_snv_79b | |
sun | opensolaris | build_snv_88 | |
sun | opensolaris | build_snv_88 | |
sun | opensolaris | build_snv_89 | |
sun | opensolaris | build_snv_89 | |
sun | solaris | 10 | |
sun | solaris | 10 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sun:opensolaris:build_snv_01:*:sparc:*:*:*:*:*", "matchCriteriaId": "EFDB74EA-C4E0-47E2-A22A-ED2D763ED644", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:build_snv_01:*:x86:*:*:*:*:*", "matchCriteriaId": "98445126-C244-4031-A9BC-E5A75AF8FE6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:build_snv_02:*:sparc:*:*:*:*:*", "matchCriteriaId": "32AE6527-AF60-4C00-9F75-11F550CEEE9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:build_snv_02:*:x86:*:*:*:*:*", "matchCriteriaId": "E669599A-7D4F-4F49-A359-A158D81F56F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:build_snv_13:*:sparc:*:*:*:*:*", "matchCriteriaId": "ACA190A7-7633-4285-B0F9-A7FF91C7C02B", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:build_snv_13:*:x86:*:*:*:*:*", "matchCriteriaId": "90DF6C89-265E-4281-8557-FE1DFAF4890C", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:build_snv_19:*:sparc:*:*:*:*:*", "matchCriteriaId": "70B28D10-69C4-4E8F-9772-EEF8BF2677CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:build_snv_19:*:x86:*:*:*:*:*", "matchCriteriaId": "D77A8D1C-89B8-4926-8F1E-676315C42EAF", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:build_snv_22:*:sparc:*:*:*:*:*", "matchCriteriaId": "0268A9F2-F387-4894-9373-CBC39F38439F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:build_snv_22:*:x86:*:*:*:*:*", "matchCriteriaId": "DB045976-32B5-466F-A74F-51A1E9CB074C", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:build_snv_39:*:sparc:*:*:*:*:*", "matchCriteriaId": "D31BF463-18B0-4C7D-9318-0853B57200F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:build_snv_39:*:x86:*:*:*:*:*", "matchCriteriaId": "2DFA1F8F-6718-4E66-A70A-2B4B46F41A07", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:build_snv_47:*:sparc:*:*:*:*:*", "matchCriteriaId": "6E316AEF-AA3B-4A3E-AC24-0E49C6A2C5C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:build_snv_47:*:x86:*:*:*:*:*", "matchCriteriaId": "FD3142C5-7F3F-4F2E-BBC7-9E37E6B84A58", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:build_snv_64:*:sparc:*:*:*:*:*", "matchCriteriaId": "37F4D1F9-E7CE-4186-A435-19077D88D6F4", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:build_snv_64:*:x86:*:*:*:*:*", "matchCriteriaId": "7A0927CE-4B92-458B-977D-ED45FB00EC73", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:build_snv_79b:*:sparc:*:*:*:*:*", "matchCriteriaId": "561DFA15-7A7D-4200-9C5D-F6B62278FBA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:build_snv_79b:*:x86:*:*:*:*:*", "matchCriteriaId": "CCD40731-5049-4317-97AA-339A7086E257", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:build_snv_88:*:sparc:*:*:*:*:*", "matchCriteriaId": "07F9A55B-10F1-4ED1-B336-C0B4AE280405", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:build_snv_88:*:x86:*:*:*:*:*", "matchCriteriaId": "2AE1AB01-1B7A-4443-90D7-B688E857B1C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:build_snv_89:*:sparc:*:*:*:*:*", "matchCriteriaId": "4230884B-C46E-4720-9A53-702F46D5D7E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:build_snv_89:*:x86:*:*:*:*:*", "matchCriteriaId": "A4A18AF8-15B7-442F-B7AA-0CF6EAD8242E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:solaris:10:*:sparc:*:*:*:*:*", "matchCriteriaId": "7FBA68F0-4577-46F5-A754-D365B6EFF872", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:solaris:10:*:x86:*:*:*:*:*", "matchCriteriaId": "E79CFAA6-A08A-4C70-A3D9-B02C29A17FF2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the pthread_mutex_reltimedlock_np API in Sun Solaris 10 and OpenSolaris before snv_90 allows local users to cause a denial of service (system hang or panic) via unknown vectors." }, { "lang": "es", "value": "Vulnerabilidad no especificada en la API pthread_mutex_reltimedlock_np de Sun Solaris 10 y OpenSolaris versiones anteriores a la snv_90, permite a usuarios locales provocar una denegaci\u00f3n de servicio (cuelgue del sistema o panic) a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2008-3549", "lastModified": "2024-11-21T00:49:30.877", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.7, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-08-07T21:41:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/31348" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-239387-1" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/30561" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1020634" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/2312" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44224" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5446" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/31348" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-239387-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/30561" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1020634" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2312" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44224" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5446" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" }, { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.