fkie_cve-2009-2137
Vulnerability from fkie_nvd
Published
2009-06-19 19:30
Modified
2024-11-21 01:04
Severity ?
Summary
Memory leak in the Ultra-SPARC T2 crypto provider device driver (aka n2cp) in Sun Solaris 10, and OpenSolaris snv_54 through snv_112, allows context-dependent attackers to cause a denial of service (memory consumption) via unspecified vectors related to a large keylen value.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sun:opensolaris:snv_54:*:sparc:*:*:*:*:*", "matchCriteriaId": "F8E26C9E-F87E-4484-89B9-42471F8410B6", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_55:*:sparc:*:*:*:*:*", "matchCriteriaId": "79E3D7EB-5B19-4D35-BE23-AB477E08FFEC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_56:*:sparc:*:*:*:*:*", "matchCriteriaId": "B06BC6D2-385C-4BC4-9AAB-EEFF600DF2EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_57:*:sparc:*:*:*:*:*", "matchCriteriaId": "15B2F895-CBFB-4E19-AF7E-7011EB0A372E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_58:*:sparc:*:*:*:*:*", "matchCriteriaId": "311F14F7-EE01-4525-8C58-8BF650246026", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_59:*:sparc:*:*:*:*:*", "matchCriteriaId": "BC339789-4DC4-4A82-A1BE-CE59AC0D657F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_60:*:sparc:*:*:*:*:*", "matchCriteriaId": "CF7C1C94-48A4-4F46-A337-92EB7B8C6837", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_61:*:sparc:*:*:*:*:*", "matchCriteriaId": "14C63D62-F6D4-4616-AF05-5E3387D63BC1", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_62:*:sparc:*:*:*:*:*", "matchCriteriaId": "6624E8DE-696A-402C-9088-CFE8ECC086BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_63:*:sparc:*:*:*:*:*", "matchCriteriaId": "04B5A32E-3D42-4500-A2BE-7ADFF3903386", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_64:*:sparc:*:*:*:*:*", "matchCriteriaId": "244EBFE7-05DD-4BBB-9793-310D71AC1721", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_65:*:sparc:*:*:*:*:*", "matchCriteriaId": "325EF996-AB8D-48CE-9A59-D338C823D927", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_66:*:sparc:*:*:*:*:*", "matchCriteriaId": "0EC8063A-1266-4443-B404-BB9C4D265B75", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_67:*:sparc:*:*:*:*:*", "matchCriteriaId": "424C989F-99C8-4337-AF15-4A51329938DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_68:*:sparc:*:*:*:*:*", "matchCriteriaId": "DA7ED4ED-938F-44B7-85ED-AFA6728DFE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_69:*:sparc:*:*:*:*:*", "matchCriteriaId": "43F1BFC7-BA9F-44EE-BD08-F70DFB2CFB33", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_70:*:sparc:*:*:*:*:*", "matchCriteriaId": "059880C5-B7FF-492D-97CA-FBC174FF8BF1", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_71:*:sparc:*:*:*:*:*", "matchCriteriaId": "5AC08000-2E71-465A-85F0-1AB8D1A51762", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_72:*:sparc:*:*:*:*:*", "matchCriteriaId": "D5CCA31F-9BF3-4E6F-B72C-1A54AFB1D07B", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_73:*:sparc:*:*:*:*:*", "matchCriteriaId": "C5D58609-62CB-446F-995E-FD334B89F6BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_74:*:sparc:*:*:*:*:*", "matchCriteriaId": "D45394E8-BE87-4BAC-89CE-B1F0E4BBBE94", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_75:*:sparc:*:*:*:*:*", "matchCriteriaId": "1B0F8F99-99B0-4A01-884B-442CEF8D061A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_76:*:sparc:*:*:*:*:*", "matchCriteriaId": "0CCE3456-0BA0-4303-B7CE-22B63EE86F03", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_77:*:sparc:*:*:*:*:*", "matchCriteriaId": "A4027F7E-F867-4DC7-BA53-08D7B36E13F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_78:*:sparc:*:*:*:*:*", "matchCriteriaId": "906228D3-2561-45C0-A79D-BAAC9F1AD7ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_79:*:sparc:*:*:*:*:*", "matchCriteriaId": "7BE4DE93-D189-4528-89DA-17E9325457E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_80:*:sparc:*:*:*:*:*", "matchCriteriaId": "C4D46760-1924-4713-963E-E4A9AD085394", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_81:*:sparc:*:*:*:*:*", "matchCriteriaId": "B579204A-62EB-4D86-A22B-0726B9CB88DE", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_82:*:sparc:*:*:*:*:*", "matchCriteriaId": "636FD13F-0A30-4B03-8AEC-ED225FC71251", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_83:*:sparc:*:*:*:*:*", "matchCriteriaId": "B0593352-A568-4DDA-B1B8-77FA6DC93B54", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_84:*:sparc:*:*:*:*:*", "matchCriteriaId": "5299CAB1-9819-4AE4-9429-8CA32F692C86", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_85:*:sparc:*:*:*:*:*", "matchCriteriaId": "ECD23A89-A86B-44D3-A3D1-EFF3D8551DCE", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_86:*:sparc:*:*:*:*:*", "matchCriteriaId": "75B778E3-EFCF-4AB0-B2C7-E585C190CD3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_87:*:sparc:*:*:*:*:*", "matchCriteriaId": "80CFB4CD-CE38-4F24-87EE-0CA622E4E9A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_88:*:sparc:*:*:*:*:*", "matchCriteriaId": "460EE9E9-27BA-4C8B-9F06-BBA648105720", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_89:*:sparc:*:*:*:*:*", "matchCriteriaId": "57CA01EF-2AFC-44FB-96EE-AF85B3019BEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_90:*:sparc:*:*:*:*:*", "matchCriteriaId": "CD673F9F-442E-4997-A0E3-D4B595D16B3E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_91:*:sparc:*:*:*:*:*", "matchCriteriaId": "0BEADEEA-4D63-4E69-BFEE-02205150F909", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_92:*:sparc:*:*:*:*:*", "matchCriteriaId": "54DA5312-D935-444E-8154-514C5BD6E3F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_93:*:sparc:*:*:*:*:*", "matchCriteriaId": "EA41BAD9-BC09-4E5C-8759-AD4E4D2B3ACC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_94:*:sparc:*:*:*:*:*", "matchCriteriaId": "FF6EFE12-51AD-4879-9529-B7EA425059C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_95:*:sparc:*:*:*:*:*", "matchCriteriaId": "7E32AD47-A96B-4A83-AEA2-98E6DD1FD5BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_96:*:sparc:*:*:*:*:*", "matchCriteriaId": "7A54DEC9-4F04-4E0A-B253-8822F114DCC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_97:*:sparc:*:*:*:*:*", "matchCriteriaId": "447E9E9E-5B19-4261-8B70-F63EAE61DB95", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_98:*:sparc:*:*:*:*:*", "matchCriteriaId": "2B4A015E-802F-4440-AF10-683B5E0586B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_99:*:sparc:*:*:*:*:*", "matchCriteriaId": "04D12F3A-4C47-4B49-B3DE-484C1EE466E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_100:*:sparc:*:*:*:*:*", "matchCriteriaId": "5BE8232A-2464-449A-A7B6-D44447AA9080", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_101:*:sparc:*:*:*:*:*", "matchCriteriaId": "37D9D7A5-63F5-49F6-90EE-EBE5B3FA6DBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_102:*:sparc:*:*:*:*:*", "matchCriteriaId": "6061C499-21A8-4EC4-B5AD-F6E876B15C48", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_103:*:sparc:*:*:*:*:*", "matchCriteriaId": "677C89EB-1575-46B6-A07C-C8BAA829F620", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_104:*:sparc:*:*:*:*:*", "matchCriteriaId": "59679597-3883-4D20-A6E6-0C1CB0BAB3E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_105:*:sparc:*:*:*:*:*", "matchCriteriaId": "98368E28-F8A9-40E3-ADB4-BF9F9F20F76D", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_106:*:sparc:*:*:*:*:*", "matchCriteriaId": "A799B071-D0A6-47C4-80DF-75AB9ADD2916", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_107:*:sparc:*:*:*:*:*", "matchCriteriaId": "58A9EC84-8FD4-455F-95DE-FBFD67A1441E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_108:*:sparc:*:*:*:*:*", "matchCriteriaId": "BB9190F5-DF79-4EFC-B8B8-5B373BCDD1F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_109:*:sparc:*:*:*:*:*", "matchCriteriaId": "264D137D-0B78-4F47-AA9F-427D535A1AE7", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_110:*:sparc:*:*:*:*:*", "matchCriteriaId": "7D970B1B-44C6-443B-9029-D7182782BD1F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_111:*:sparc:*:*:*:*:*", "matchCriteriaId": "A4CA00AD-837E-4E3E-AE7E-A49CC3AF44A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_112:*:sparc:*:*:*:*:*", "matchCriteriaId": "698744C6-2A65-478B-A846-099E6C86D0B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:solaris:10:*:sparc:*:*:*:*:*", "matchCriteriaId": "7FBA68F0-4577-46F5-A754-D365B6EFF872", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory leak in the Ultra-SPARC T2 crypto provider device driver (aka n2cp) in Sun Solaris 10, and OpenSolaris snv_54 through snv_112, allows context-dependent attackers to cause a denial of service (memory consumption) via unspecified vectors related to a large keylen value." }, { "lang": "es", "value": "Fuga de memoria en el controlador del dispositivo proveedor criptogr\u00e1fico Ultra-SPARC T2 (tambi\u00e9n conocido como n2cp) en Sun Solaris v10, y OpenSolaris snv_54 hasta snv_112, permite a los atacantes dependientes del contexto provocar una denegaci\u00f3n de servicio (consumo de memoria) mediante vectores no especificados relacionados con un valor grande en \"keylen\"." } ], "id": "CVE-2009-2137", "lastModified": "2024-11-21T01:04:13.030", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-06-19T19:30:00.250", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/55234" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/35403" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-140386-03-1" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-258828-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/55234" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/35403" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-140386-03-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-258828-1" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.