fkie_cve-2009-4226
Vulnerability from fkie_nvd
Published
2009-12-08 18:30
Modified
2024-11-21 01:09
Severity ?
Summary
Race condition in the IP module in the kernel in Sun OpenSolaris snv_106 through snv_124 allows remote attackers to cause a denial of service (NULL pointer dereference and panic) via unspecified vectors related to the (1) tcp_do_getsockname or (2) tcp_do_getpeername function.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sun | opensolaris | snv_106 | |
sun | opensolaris | snv_106 | |
sun | opensolaris | snv_107 | |
sun | opensolaris | snv_107 | |
sun | opensolaris | snv_108 | |
sun | opensolaris | snv_108 | |
sun | opensolaris | snv_109 | |
sun | opensolaris | snv_109 | |
sun | opensolaris | snv_110 | |
sun | opensolaris | snv_110 | |
sun | opensolaris | snv_111 | |
sun | opensolaris | snv_111 | |
sun | opensolaris | snv_112 | |
sun | opensolaris | snv_112 | |
sun | opensolaris | snv_113 | |
sun | opensolaris | snv_113 | |
sun | opensolaris | snv_114 | |
sun | opensolaris | snv_114 | |
sun | opensolaris | snv_115 | |
sun | opensolaris | snv_115 | |
sun | opensolaris | snv_116 | |
sun | opensolaris | snv_116 | |
sun | opensolaris | snv_117 | |
sun | opensolaris | snv_117 | |
sun | opensolaris | snv_118 | |
sun | opensolaris | snv_118 | |
sun | opensolaris | snv_119 | |
sun | opensolaris | snv_119 | |
sun | opensolaris | snv_120 | |
sun | opensolaris | snv_120 | |
sun | opensolaris | snv_121 | |
sun | opensolaris | snv_121 | |
sun | opensolaris | snv_122 | |
sun | opensolaris | snv_122 | |
sun | opensolaris | snv_123 | |
sun | opensolaris | snv_123 | |
sun | opensolaris | snv_124 | |
sun | opensolaris | snv_124 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sun:opensolaris:snv_106:*:sparc:*:*:*:*:*", "matchCriteriaId": "A799B071-D0A6-47C4-80DF-75AB9ADD2916", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_106:*:x86:*:*:*:*:*", "matchCriteriaId": "F276AFE2-B501-4355-9716-9D1A75AD09CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_107:*:sparc:*:*:*:*:*", "matchCriteriaId": "58A9EC84-8FD4-455F-95DE-FBFD67A1441E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_107:*:x86:*:*:*:*:*", "matchCriteriaId": "8ADE7EBB-8014-459F-A189-9D902BEE1FD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_108:*:sparc:*:*:*:*:*", "matchCriteriaId": "BB9190F5-DF79-4EFC-B8B8-5B373BCDD1F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_108:*:x86:*:*:*:*:*", "matchCriteriaId": "FF3DEB74-D65C-427A-8907-6044238E8C03", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_109:*:sparc:*:*:*:*:*", "matchCriteriaId": "264D137D-0B78-4F47-AA9F-427D535A1AE7", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_109:*:x86:*:*:*:*:*", "matchCriteriaId": "A7A2D975-A03A-494A-8CFE-2D8932906C14", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_110:*:sparc:*:*:*:*:*", "matchCriteriaId": "7D970B1B-44C6-443B-9029-D7182782BD1F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_110:*:x86:*:*:*:*:*", "matchCriteriaId": "5B3DB52A-595F-4A50-98D5-DF308471B823", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_111:*:sparc:*:*:*:*:*", "matchCriteriaId": "A4CA00AD-837E-4E3E-AE7E-A49CC3AF44A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_111:*:x86:*:*:*:*:*", "matchCriteriaId": "B3BBCE23-9F15-45CD-859F-77ED540B51F3", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_112:*:sparc:*:*:*:*:*", "matchCriteriaId": "698744C6-2A65-478B-A846-099E6C86D0B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_112:*:x86:*:*:*:*:*", "matchCriteriaId": "053A0DA6-483C-49BB-BC7A-E624DB2C269E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_113:*:sparc:*:*:*:*:*", "matchCriteriaId": "EEF667A1-1AE1-42D4-8DB4-CE414CEA3E8B", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_113:*:x86:*:*:*:*:*", "matchCriteriaId": "447212A4-FACD-475E-A62B-60FE6504F63E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_114:*:sparc:*:*:*:*:*", "matchCriteriaId": "EE9DD764-8B9F-4922-BFAD-3FCC56CF9705", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_114:*:x86:*:*:*:*:*", "matchCriteriaId": "AB694DC0-407A-4555-8B72-DAF3C169DCE5", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_115:*:sparc:*:*:*:*:*", "matchCriteriaId": "78B80C92-7EB5-4343-B830-32E8C011E572", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_115:*:x86:*:*:*:*:*", "matchCriteriaId": "535FF689-13A2-40C6-8706-7782038FDBD3", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_116:*:sparc:*:*:*:*:*", "matchCriteriaId": "46E4ED9C-F013-48D2-8642-E5BA7599A512", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_116:*:x86:*:*:*:*:*", "matchCriteriaId": "843246D3-C2DA-454D-916A-AC8905E5134E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_117:*:sparc:*:*:*:*:*", "matchCriteriaId": "A1E8108D-3CE7-4041-9027-1CA7473389EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_117:*:x86:*:*:*:*:*", "matchCriteriaId": "244B7FE4-C485-4993-9810-3433C83A120E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_118:*:sparc:*:*:*:*:*", "matchCriteriaId": "33E95F0E-D3D5-47CB-B503-7B7F92FB3F15", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_118:*:x86:*:*:*:*:*", "matchCriteriaId": "BE586AB9-9D46-4BC2-8092-51482F297410", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_119:*:sparc:*:*:*:*:*", "matchCriteriaId": "E8585133-1F25-494A-8859-87B1D93305A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_119:*:x86:*:*:*:*:*", "matchCriteriaId": "3A5C836E-51A5-4B1C-AB03-A4DFDA440BD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_120:*:sparc:*:*:*:*:*", "matchCriteriaId": "F61CD721-197F-4BB3-9D59-CB3C16D6B1B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_120:*:x86:*:*:*:*:*", "matchCriteriaId": "A1D4C98B-0D01-461C-93C2-0AF9DA6519A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_121:*:sparc:*:*:*:*:*", "matchCriteriaId": "3D01EACB-9DB4-4940-A1F2-40474B24AEFD", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_121:*:x86:*:*:*:*:*", "matchCriteriaId": "A0CE1A06-2588-47AA-81F8-E3655F915C33", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_122:*:sparc:*:*:*:*:*", "matchCriteriaId": "D1BBB436-9F7A-4E2D-908B-D57A531B1B3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_122:*:x86:*:*:*:*:*", "matchCriteriaId": "5972E930-76E2-40FD-8E7F-74E012D34E39", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_123:*:sparc:*:*:*:*:*", "matchCriteriaId": "45B5E359-6FF2-4029-AB6A-3C906DE6AF1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_123:*:x86:*:*:*:*:*", "matchCriteriaId": "A5991C3F-29F6-462F-A34E-2446E357A220", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_124:*:sparc:*:*:*:*:*", "matchCriteriaId": "09B35C0E-6CBA-4B6B-BCD2-F5CC0BF8CF53", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_124:*:x86:*:*:*:*:*", "matchCriteriaId": "9C93BA4F-D07C-494C-B320-F34B8DED05C0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Race condition in the IP module in the kernel in Sun OpenSolaris snv_106 through snv_124 allows remote attackers to cause a denial of service (NULL pointer dereference and panic) via unspecified vectors related to the (1) tcp_do_getsockname or (2) tcp_do_getpeername function." }, { "lang": "es", "value": "Condici\u00f3n Race en el m\u00f3dulo IP en el kernel en Sun OpenSolaris snv_106 hasta snv_124 permite a atacantes remotos causar una denegaci\u00f3n de servicio (desreferencia a un puntero NULL y panico) a trav\u00e9s de un vector no especificado relacionado con la funci\u00f3n (1) tcp_do_getsockname o (2) tcp_do_getpeername" } ], "id": "CVE-2009-4226", "lastModified": "2024-11-21T01:09:11.850", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-12-08T18:30:00.280", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://opensolaris.org/jive/thread.jspa?messageID=415069\u0026tstart=0" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-268189-1" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3413" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54574" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://opensolaris.org/jive/thread.jspa?messageID=415069\u0026tstart=0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-268189-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3413" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54574" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-362" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.