fkie_cve-2009-0838
Vulnerability from fkie_nvd
Published
2009-03-06 18:30
Modified
2024-11-21 01:01
Severity ?
Summary
The crypto pseudo device driver in Sun Solaris 10, and OpenSolaris snv_88 through snv_102, does not properly free memory, which allows local users to cause a denial of service (panic) via unspecified vectors, related to the vmem_hash_delete function.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sun | opensolaris | snv_88 | |
sun | opensolaris | snv_88 | |
sun | opensolaris | snv_88 | |
sun | opensolaris | snv_89 | |
sun | opensolaris | snv_89 | |
sun | opensolaris | snv_89 | |
sun | opensolaris | snv_90 | |
sun | opensolaris | snv_90 | |
sun | opensolaris | snv_90 | |
sun | opensolaris | snv_91 | |
sun | opensolaris | snv_91 | |
sun | opensolaris | snv_91 | |
sun | opensolaris | snv_92 | |
sun | opensolaris | snv_92 | |
sun | opensolaris | snv_92 | |
sun | opensolaris | snv_93 | |
sun | opensolaris | snv_93 | |
sun | opensolaris | snv_93 | |
sun | opensolaris | snv_94 | |
sun | opensolaris | snv_94 | |
sun | opensolaris | snv_94 | |
sun | opensolaris | snv_95 | |
sun | opensolaris | snv_95 | |
sun | opensolaris | snv_95 | |
sun | opensolaris | snv_96 | |
sun | opensolaris | snv_96 | |
sun | opensolaris | snv_97 | |
sun | opensolaris | snv_97 | |
sun | opensolaris | snv_98 | |
sun | opensolaris | snv_98 | |
sun | opensolaris | snv_99 | |
sun | opensolaris | snv_99 | |
sun | opensolaris | snv_100 | |
sun | opensolaris | snv_100 | |
sun | opensolaris | snv_101 | |
sun | opensolaris | snv_101 | |
sun | opensolaris | snv_101b | |
sun | opensolaris | snv_102 | |
sun | opensolaris | snv_102 | |
sun | sunos | 5.10 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sun:opensolaris:snv_88:*:*:*:*:*:*:*", "matchCriteriaId": "E5F33FE6-B2A7-4D20-8425-C545139103A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_88:*:sparc:*:*:*:*:*", "matchCriteriaId": "460EE9E9-27BA-4C8B-9F06-BBA648105720", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_88:*:x86:*:*:*:*:*", "matchCriteriaId": "4126C6C9-90AB-470E-AF83-4ED1FDD90511", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_89:*:*:*:*:*:*:*", "matchCriteriaId": "287C4B1B-FFA8-452E-98BF-8B2EB30F6B6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_89:*:sparc:*:*:*:*:*", "matchCriteriaId": "57CA01EF-2AFC-44FB-96EE-AF85B3019BEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_89:*:x86:*:*:*:*:*", "matchCriteriaId": "3275E47F-5A4B-4843-A07C-82DEE852672C", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_90:*:*:*:*:*:*:*", "matchCriteriaId": "F666F65E-BFA9-4F06-A84F-844D7E5DEBBC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_90:*:sparc:*:*:*:*:*", "matchCriteriaId": "CD673F9F-442E-4997-A0E3-D4B595D16B3E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_90:x86:*:*:*:*:*:*", "matchCriteriaId": "FB134C5D-D0FF-436C-8304-5CED1EC54A7E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_91:*:*:*:*:*:*:*", "matchCriteriaId": "7B36C324-ADFA-4885-846E-059872C95B25", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_91:*:sparc:*:*:*:*:*", "matchCriteriaId": "0BEADEEA-4D63-4E69-BFEE-02205150F909", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_91:*:x86:*:*:*:*:*", "matchCriteriaId": "6692EE63-A76B-47C3-BC0D-7C15CA6FE013", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_92:*:*:*:*:*:*:*", "matchCriteriaId": "FB88D92E-A71C-4EA7-8A30-0109E62E9F26", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_92:*:sparc:*:*:*:*:*", "matchCriteriaId": "54DA5312-D935-444E-8154-514C5BD6E3F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_92:*:x86:*:*:*:*:*", "matchCriteriaId": "BA1E27E5-FE20-42FA-9A61-A7174E705EB3", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_93:*:*:*:*:*:*:*", "matchCriteriaId": "CD8801EA-A577-4388-83F7-174F168B66E3", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_93:*:sparc:*:*:*:*:*", "matchCriteriaId": "EA41BAD9-BC09-4E5C-8759-AD4E4D2B3ACC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_93:*:x86:*:*:*:*:*", "matchCriteriaId": "65A32803-580D-4D07-B39B-2159258CBA8B", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_94:*:*:*:*:*:*:*", "matchCriteriaId": "FFF21371-BC95-4815-AE8D-34361B5FA3B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_94:*:sparc:*:*:*:*:*", "matchCriteriaId": "FF6EFE12-51AD-4879-9529-B7EA425059C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_94:*:x86:*:*:*:*:*", "matchCriteriaId": "13B51612-3BD6-449F-AD63-D01F8D05B269", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_95:*:*:*:*:*:*:*", "matchCriteriaId": "E5C02D1A-F957-44AD-B7D0-ECF59695C6AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_95:*:sparc:*:*:*:*:*", "matchCriteriaId": "7E32AD47-A96B-4A83-AEA2-98E6DD1FD5BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_95:*:x86:*:*:*:*:*", "matchCriteriaId": "4B2E7E54-2268-4C54-9363-C2D363D3A447", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_96:*:sparc:*:*:*:*:*", "matchCriteriaId": "7A54DEC9-4F04-4E0A-B253-8822F114DCC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_96:*:x86:*:*:*:*:*", "matchCriteriaId": "F6000B0F-0E72-4E68-A5EE-35BA6FB59C57", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_97:*:sparc:*:*:*:*:*", "matchCriteriaId": "447E9E9E-5B19-4261-8B70-F63EAE61DB95", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_97:*:x86:*:*:*:*:*", "matchCriteriaId": "51AB0746-66E6-4FF5-9CB2-42E29A01C961", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_98:*:sparc:*:*:*:*:*", "matchCriteriaId": "2B4A015E-802F-4440-AF10-683B5E0586B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_98:*:x86:*:*:*:*:*", "matchCriteriaId": "D1A9DCF7-F469-4D77-966F-3721F377D80B", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_99:*:sparc:*:*:*:*:*", "matchCriteriaId": "04D12F3A-4C47-4B49-B3DE-484C1EE466E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_99:*:x86:*:*:*:*:*", "matchCriteriaId": "3D028821-CA38-48C4-9324-222526AC8413", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_100:*:sparc:*:*:*:*:*", "matchCriteriaId": "5BE8232A-2464-449A-A7B6-D44447AA9080", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_100:*:x86:*:*:*:*:*", "matchCriteriaId": "1F2CB558-9390-4AAE-A66D-E3DA537E3115", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_101:*:sparc:*:*:*:*:*", "matchCriteriaId": "37D9D7A5-63F5-49F6-90EE-EBE5B3FA6DBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_101:*:x86:*:*:*:*:*", "matchCriteriaId": "5ED4FAD0-E91F-438D-A3CB-BACFB7F7E975", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_101b:*:*:*:*:*:*:*", "matchCriteriaId": "86931B59-DAD2-474B-B030-3B1389278C49", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_102:*:sparc:*:*:*:*:*", "matchCriteriaId": "6061C499-21A8-4EC4-B5AD-F6E876B15C48", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_102:*:x86:*:*:*:*:*", "matchCriteriaId": "411B33D1-F55D-42C0-9046-040ABC42E31B", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*", "matchCriteriaId": "E75493D0-F060-4CBA-8AB0-C4FE8B2A8C9B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The crypto pseudo device driver in Sun Solaris 10, and OpenSolaris snv_88 through snv_102, does not properly free memory, which allows local users to cause a denial of service (panic) via unspecified vectors, related to the vmem_hash_delete function." }, { "lang": "es", "value": "El controlador crypto pseudo en Sun Solaris v10, y OpenSolaris snv_88 hasta snv_102, no libera memoria adecuadamente, lo cual permite a usuarios locales provocar una denegaci\u00f3n de servicio (p\u00e1nico) a trav\u00e9s de vectores no especificados, relacionado con la funci\u00f3n vmem_hash_delete." } ], "id": "CVE-2009-0838", "lastModified": "2024-11-21T01:01:01.557", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-03-06T18:30:00.717", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34149" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/34455" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1021810" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-139498-04-1" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-254088-1" }, { "source": "cve@mitre.org", "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-097.htm" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/34000" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/0606" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/0815" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49105" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5641" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34149" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/34455" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1021810" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-139498-04-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-254088-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-097.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/34000" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/0606" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/0815" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49105" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5641" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.