fkie_cve-2008-6024
Vulnerability from fkie_nvd
Published
2009-02-02 22:00
Modified
2024-11-21 00:55
Severity ?
Summary
Unspecified vulnerability in the NFSv4 client module in the kernel on Sun Solaris 10 and OpenSolaris before snv_37, when automountd is used, allows user-assisted remote attackers to cause a denial of service (unresponsive NFS filesystems) via unknown vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sun:opensolaris:*:*:sparc:*:*:*:*:*", "matchCriteriaId": "C48B6DFB-476E-4818-B2A4-3E64097372C8", "versionEndIncluding": "snv_36", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:*:*:x86:*:*:*:*:*", "matchCriteriaId": "736EDE85-BBDD-48C7-A5FA-C94FE0AB53B3", "versionEndIncluding": "snv_36", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_01:*:sparc:*:*:*:*:*", "matchCriteriaId": "7317C4A1-1365-40DD-A86F-808B64863750", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_01:*:x86:*:*:*:*:*", "matchCriteriaId": "7188371F-AE6E-437D-8F75-DE7049A51000", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_02:*:sparc:*:*:*:*:*", "matchCriteriaId": "79D94087-1308-408F-8C73-600B73AD958F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_02:*:x86:*:*:*:*:*", "matchCriteriaId": "015968E1-B81E-4242-B4DF-94716179053B", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_03:*:sparc:*:*:*:*:*", "matchCriteriaId": "DA468ACC-9AE2-4EF6-9B09-CF63092021D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_03:*:x86:*:*:*:*:*", "matchCriteriaId": "92262770-06B3-4B68-8DBE-AB6C61135F7C", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_04:*:sparc:*:*:*:*:*", "matchCriteriaId": "16719C48-5A35-4FEC-BE5F-3EA10A0357CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_04:*:x86:*:*:*:*:*", "matchCriteriaId": "C4DC58C1-792B-433D-A27B-5731C8414EBC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_05:*:sparc:*:*:*:*:*", "matchCriteriaId": "5F87D3D5-0D3F-44BB-B15B-BB6D903A56E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_05:*:x86:*:*:*:*:*", "matchCriteriaId": "4AC63928-38F2-4677-8CBC-2F7DE0EF078F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_06:*:sparc:*:*:*:*:*", "matchCriteriaId": "438EA608-2748-49E9-9B2A-663C774E627F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_06:*:x86:*:*:*:*:*", "matchCriteriaId": "41B216C6-4BE9-4D47-A86E-4AD50ECB8F07", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_07:*:sparc:*:*:*:*:*", "matchCriteriaId": "B7E3945D-1580-4C68-93E0-E4CF96620C6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_07:*:x86:*:*:*:*:*", "matchCriteriaId": "32AE7035-EA81-4A9B-A4C3-B85844E24FA5", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_08:*:sparc:*:*:*:*:*", "matchCriteriaId": "51469BA0-7B46-4E79-9E35-A388AD834B29", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_08:*:x86:*:*:*:*:*", "matchCriteriaId": "948CAA3F-C5B0-434E-A4B1-16600729A17E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_09:*:sparc:*:*:*:*:*", "matchCriteriaId": "49F52449-96AB-45BA-95F6-581F720D1819", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_09:*:x86:*:*:*:*:*", "matchCriteriaId": "168AD0C1-B437-4B5D-8AC4-BA4C6C60829B", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_10:*:sparc:*:*:*:*:*", "matchCriteriaId": "7FC6243A-A896-4E52-B241-BDEA7486DAC3", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_10:*:x86:*:*:*:*:*", "matchCriteriaId": "CDAD01B1-25E3-4ABD-BA48-03491D9C0D84", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_11:*:sparc:*:*:*:*:*", "matchCriteriaId": "E88850F1-A647-44B3-806A-71FC157D4964", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_11:*:x86:*:*:*:*:*", "matchCriteriaId": "B38088AD-968D-44B9-ABCE-4E4D8675A88A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_12:*:sparc:*:*:*:*:*", "matchCriteriaId": "9D15E371-4317-4882-BA09-F8CABB632C2C", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_12:*:x86:*:*:*:*:*", "matchCriteriaId": "7C385492-0B33-4757-9907-E69C7F709527", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_13:*:sparc:*:*:*:*:*", "matchCriteriaId": "311FC329-D973-4F51-B110-7FF1ED40DFA5", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_13:*:x86:*:*:*:*:*", "matchCriteriaId": "01C7A393-6744-4913-A9CC-75F311D2C59F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_14:*:sparc:*:*:*:*:*", "matchCriteriaId": "0288EC6B-C561-475C-9A3D-1ACF395B7326", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_14:*:x86:*:*:*:*:*", "matchCriteriaId": "F4961C98-1C39-4E6E-A0DB-C48E40F4FF54", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_15:*:sparc:*:*:*:*:*", "matchCriteriaId": "D5CBEFF0-7B69-4831-AAC7-C02455D42900", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_15:*:x86:*:*:*:*:*", "matchCriteriaId": "4DCF6792-8671-4CC0-99D5-7224E2B751A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_16:*:sparc:*:*:*:*:*", "matchCriteriaId": "6D4F7E6E-330F-4E02-A2FE-F7288ADFFA0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_16:*:x86:*:*:*:*:*", "matchCriteriaId": "FFB7E165-13D6-41D5-B1C3-F96669E54796", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_17:*:sparc:*:*:*:*:*", "matchCriteriaId": "B5D6CD58-C4AF-42AC-9377-EC1F1308FF29", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_17:*:x86:*:*:*:*:*", "matchCriteriaId": "D6011B94-9326-47A7-8292-BA0210401DC4", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_18:*:sparc:*:*:*:*:*", "matchCriteriaId": "AF924217-C227-4B90-9781-00561CE9C54A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_18:*:x86:*:*:*:*:*", "matchCriteriaId": "9C2C4B0B-9B7A-4861-8CA8-64FC84DF31BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_19:*:sparc:*:*:*:*:*", "matchCriteriaId": "114D9D19-23BC-41AF-9B30-40AB2852E74F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_19:*:x86:*:*:*:*:*", "matchCriteriaId": "F36C1E99-8CCD-48B7-94A7-8753AD7D6FBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_20:*:sparc:*:*:*:*:*", "matchCriteriaId": "F620054A-4D53-443B-8897-B2A5AB928CA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_20:*:x86:*:*:*:*:*", "matchCriteriaId": "2F57B586-3593-41F9-9D01-0E18F58EB81A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_21:*:sparc:*:*:*:*:*", "matchCriteriaId": "FD1FDEB4-E659-41D0-B81E-FC1A1391288E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_21:*:x86:*:*:*:*:*", "matchCriteriaId": "2E3B6A48-CA60-4ED9-BFF9-0FCDFABA865A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_22:*:sparc:*:*:*:*:*", "matchCriteriaId": "218570AD-18C7-440E-A5BD-F16708ED4B08", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_22:*:x86:*:*:*:*:*", "matchCriteriaId": "09162A43-7EF2-464D-AD60-7046456932B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_23:*:sparc:*:*:*:*:*", "matchCriteriaId": "2336F214-18CC-42A5-9DD0-1F1C09959CC9", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_23:*:x86:*:*:*:*:*", "matchCriteriaId": "3A4ECA0D-AB73-4790-945B-98CF6E27B94F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_24:*:sparc:*:*:*:*:*", "matchCriteriaId": "207D2103-58A9-4BF9-81EF-74B264DB1B4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_24:*:x86:*:*:*:*:*", "matchCriteriaId": "530E1CDB-3B46-4762-875F-0B1075790204", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_25:*:sparc:*:*:*:*:*", "matchCriteriaId": "8A4F9110-059D-4F6E-9414-762BD6142CDE", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_25:*:x86:*:*:*:*:*", "matchCriteriaId": "55888CA5-938A-42D4-9898-93ED1AD88650", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_26:*:sparc:*:*:*:*:*", "matchCriteriaId": "F1B245F6-DE46-4D52-98EE-32601FBCD254", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_26:*:x86:*:*:*:*:*", "matchCriteriaId": "5D99E1F3-0341-43A9-9692-2AC812811EA6", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_27:*:sparc:*:*:*:*:*", "matchCriteriaId": "28F4B989-7F55-467F-AD1A-AB965D31F504", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_27:*:x86:*:*:*:*:*", "matchCriteriaId": "27CA0C51-8331-459A-8256-9E363BE313BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_28:*:sparc:*:*:*:*:*", "matchCriteriaId": "9B6404BC-090E-419B-B10C-D275D5C0BFE5", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_28:*:x86:*:*:*:*:*", "matchCriteriaId": "3FD00DE9-D8A8-4A03-B4B8-3F4368ADDDE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_29:*:sparc:*:*:*:*:*", "matchCriteriaId": "4CF81FF0-D544-4C56-AD2E-51098DF2A1D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_29:*:x86:*:*:*:*:*", "matchCriteriaId": "4EFFA4CB-0984-4686-94BD-CE4D8AD70C42", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_30:*:sparc:*:*:*:*:*", "matchCriteriaId": "65F861F1-E66D-479D-838D-19D94DF03736", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_30:*:x86:*:*:*:*:*", "matchCriteriaId": "BF0C5932-3B2B-44C8-8C0C-31A0CB66FF7E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_31:*:sparc:*:*:*:*:*", "matchCriteriaId": "71FDF1A5-BD49-4E00-979E-3F953265E681", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_31:*:x86:*:*:*:*:*", "matchCriteriaId": "B40B4B4C-34F3-4591-8989-D7D138D54C88", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_32:*:sparc:*:*:*:*:*", "matchCriteriaId": "815771B3-541B-41D5-925F-29CB74900668", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_32:*:x86:*:*:*:*:*", "matchCriteriaId": "14FD3B27-6379-4F5C-9172-2A0494667727", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_33:*:sparc:*:*:*:*:*", "matchCriteriaId": "1EEAE62A-8BFA-4EB4-B4E9-DF83F4A33CCE", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_33:*:x86:*:*:*:*:*", "matchCriteriaId": "114D8B9E-BDE9-49E6-9CD3-18B087522577", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_34:*:sparc:*:*:*:*:*", "matchCriteriaId": "72827B1E-3F3D-40A0-AEEB-0CFFB12BF6D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_34:*:x86:*:*:*:*:*", "matchCriteriaId": "8275DABB-E792-4134-8418-496109936C1A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_35:*:sparc:*:*:*:*:*", "matchCriteriaId": "6F61F300-FEB0-42A7-87AE-E99AF2C26827", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_35:*:x86:*:*:*:*:*", "matchCriteriaId": "56768A4B-ABC8-4CF8-ABF1-059C8D4373CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:solaris:10:*:sparc:*:*:*:*:*", "matchCriteriaId": "7FBA68F0-4577-46F5-A754-D365B6EFF872", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:solaris:10:*:x86:*:*:*:*:*", "matchCriteriaId": "E79CFAA6-A08A-4C70-A3D9-B02C29A17FF2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the NFSv4 client module in the kernel on Sun Solaris 10 and OpenSolaris before snv_37, when automountd is used, allows user-assisted remote attackers to cause a denial of service (unresponsive NFS filesystems) via unknown vectors." }, { "lang": "es", "value": "Vulnerabilidad no especificada en el m\u00f3dulo del kernel del cliente NFSv4 de Sun Solaris v10 y OpenSolaris en versiones anteriores a snv_37. Cuando se utiliza automountd, permite a atacantes remotos, con la intervenci\u00f3n del usuario, causar un ataque de denegaci\u00f3n de servicio sobre los sistemas de archivos de tipo NFS mediante vectores de ataque desconocidos." } ], "id": "CVE-2008-6024", "lastModified": "2024-11-21T00:55:28.343", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 5.4, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-02-02T22:00:00.360", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/31517" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1020716" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240546-1" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/30753" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/2415" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44546" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/31517" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1020716" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240546-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/30753" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2415" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44546" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.