fkie_cve-2009-4226
Vulnerability from fkie_nvd
Published
2009-12-08 18:30
Modified
2024-11-21 01:09
Severity ?
Summary
Race condition in the IP module in the kernel in Sun OpenSolaris snv_106 through snv_124 allows remote attackers to cause a denial of service (NULL pointer dereference and panic) via unspecified vectors related to the (1) tcp_do_getsockname or (2) tcp_do_getpeername function.
Impacted products
Vendor Product Version
sun opensolaris snv_106
sun opensolaris snv_106
sun opensolaris snv_107
sun opensolaris snv_107
sun opensolaris snv_108
sun opensolaris snv_108
sun opensolaris snv_109
sun opensolaris snv_109
sun opensolaris snv_110
sun opensolaris snv_110
sun opensolaris snv_111
sun opensolaris snv_111
sun opensolaris snv_112
sun opensolaris snv_112
sun opensolaris snv_113
sun opensolaris snv_113
sun opensolaris snv_114
sun opensolaris snv_114
sun opensolaris snv_115
sun opensolaris snv_115
sun opensolaris snv_116
sun opensolaris snv_116
sun opensolaris snv_117
sun opensolaris snv_117
sun opensolaris snv_118
sun opensolaris snv_118
sun opensolaris snv_119
sun opensolaris snv_119
sun opensolaris snv_120
sun opensolaris snv_120
sun opensolaris snv_121
sun opensolaris snv_121
sun opensolaris snv_122
sun opensolaris snv_122
sun opensolaris snv_123
sun opensolaris snv_123
sun opensolaris snv_124
sun opensolaris snv_124



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_106:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "A799B071-D0A6-47C4-80DF-75AB9ADD2916",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_106:*:x86:*:*:*:*:*",
              "matchCriteriaId": "F276AFE2-B501-4355-9716-9D1A75AD09CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_107:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "58A9EC84-8FD4-455F-95DE-FBFD67A1441E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_107:*:x86:*:*:*:*:*",
              "matchCriteriaId": "8ADE7EBB-8014-459F-A189-9D902BEE1FD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_108:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "BB9190F5-DF79-4EFC-B8B8-5B373BCDD1F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_108:*:x86:*:*:*:*:*",
              "matchCriteriaId": "FF3DEB74-D65C-427A-8907-6044238E8C03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_109:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "264D137D-0B78-4F47-AA9F-427D535A1AE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_109:*:x86:*:*:*:*:*",
              "matchCriteriaId": "A7A2D975-A03A-494A-8CFE-2D8932906C14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_110:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "7D970B1B-44C6-443B-9029-D7182782BD1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_110:*:x86:*:*:*:*:*",
              "matchCriteriaId": "5B3DB52A-595F-4A50-98D5-DF308471B823",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_111:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "A4CA00AD-837E-4E3E-AE7E-A49CC3AF44A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_111:*:x86:*:*:*:*:*",
              "matchCriteriaId": "B3BBCE23-9F15-45CD-859F-77ED540B51F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_112:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "698744C6-2A65-478B-A846-099E6C86D0B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_112:*:x86:*:*:*:*:*",
              "matchCriteriaId": "053A0DA6-483C-49BB-BC7A-E624DB2C269E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_113:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "EEF667A1-1AE1-42D4-8DB4-CE414CEA3E8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_113:*:x86:*:*:*:*:*",
              "matchCriteriaId": "447212A4-FACD-475E-A62B-60FE6504F63E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_114:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "EE9DD764-8B9F-4922-BFAD-3FCC56CF9705",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_114:*:x86:*:*:*:*:*",
              "matchCriteriaId": "AB694DC0-407A-4555-8B72-DAF3C169DCE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_115:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "78B80C92-7EB5-4343-B830-32E8C011E572",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_115:*:x86:*:*:*:*:*",
              "matchCriteriaId": "535FF689-13A2-40C6-8706-7782038FDBD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_116:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "46E4ED9C-F013-48D2-8642-E5BA7599A512",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_116:*:x86:*:*:*:*:*",
              "matchCriteriaId": "843246D3-C2DA-454D-916A-AC8905E5134E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_117:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "A1E8108D-3CE7-4041-9027-1CA7473389EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_117:*:x86:*:*:*:*:*",
              "matchCriteriaId": "244B7FE4-C485-4993-9810-3433C83A120E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_118:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "33E95F0E-D3D5-47CB-B503-7B7F92FB3F15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_118:*:x86:*:*:*:*:*",
              "matchCriteriaId": "BE586AB9-9D46-4BC2-8092-51482F297410",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_119:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "E8585133-1F25-494A-8859-87B1D93305A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_119:*:x86:*:*:*:*:*",
              "matchCriteriaId": "3A5C836E-51A5-4B1C-AB03-A4DFDA440BD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_120:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "F61CD721-197F-4BB3-9D59-CB3C16D6B1B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_120:*:x86:*:*:*:*:*",
              "matchCriteriaId": "A1D4C98B-0D01-461C-93C2-0AF9DA6519A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_121:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "3D01EACB-9DB4-4940-A1F2-40474B24AEFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_121:*:x86:*:*:*:*:*",
              "matchCriteriaId": "A0CE1A06-2588-47AA-81F8-E3655F915C33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_122:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "D1BBB436-9F7A-4E2D-908B-D57A531B1B3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_122:*:x86:*:*:*:*:*",
              "matchCriteriaId": "5972E930-76E2-40FD-8E7F-74E012D34E39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_123:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "45B5E359-6FF2-4029-AB6A-3C906DE6AF1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_123:*:x86:*:*:*:*:*",
              "matchCriteriaId": "A5991C3F-29F6-462F-A34E-2446E357A220",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_124:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "09B35C0E-6CBA-4B6B-BCD2-F5CC0BF8CF53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:opensolaris:snv_124:*:x86:*:*:*:*:*",
              "matchCriteriaId": "9C93BA4F-D07C-494C-B320-F34B8DED05C0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Race condition in the IP module in the kernel in Sun OpenSolaris snv_106 through snv_124 allows remote attackers to cause a denial of service (NULL pointer dereference and panic) via unspecified vectors related to the (1) tcp_do_getsockname or (2) tcp_do_getpeername function."
    },
    {
      "lang": "es",
      "value": "Condici\u00f3n Race en el m\u00f3dulo IP en el kernel en Sun OpenSolaris snv_106 hasta snv_124 permite a atacantes remotos causar una denegaci\u00f3n de servicio (desreferencia a un puntero NULL y panico) a trav\u00e9s de un vector no especificado relacionado con la funci\u00f3n (1) tcp_do_getsockname o (2) tcp_do_getpeername"
    }
  ],
  "id": "CVE-2009-4226",
  "lastModified": "2024-11-21T01:09:11.850",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-12-08T18:30:00.280",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://opensolaris.org/jive/thread.jspa?messageID=415069\u0026tstart=0"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-268189-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/3413"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54574"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://opensolaris.org/jive/thread.jspa?messageID=415069\u0026tstart=0"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-268189-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/3413"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54574"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-362"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.