All the vulnerabilites related to oracle - sparc_t3-3
cve-2013-3838
Vulnerability from cvelistv5
Published
2013-10-16 15:00
Modified
2024-09-16 18:38
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Oracle SPARC Enterprise T & M Series Servers running Sun System Firmware before 6.7.13 for SPARC T1, 7.4.6.c for SPARC T2, 8.3.0.b for SPARC T3 & T4, 9.0.0.d for SPARC T5 and 9.0.1.e for SPARC M5 allows local users to affect availability via unknown vectors related to Sun System Firmware/Hypervisor.
References
▼ | URL | Tags |
---|---|---|
http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:22:01.361Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Oracle SPARC Enterprise T \u0026 M Series Servers running Sun System Firmware before 6.7.13 for SPARC T1, 7.4.6.c for SPARC T2, 8.3.0.b for SPARC T3 \u0026 T4, 9.0.0.d for SPARC T5 and 9.0.1.e for SPARC M5 allows local users to affect availability via unknown vectors related to Sun System Firmware/Hypervisor." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-10-16T15:00:00Z", "orgId": "43595867-4340-4103-b7a2-9a5208d29a85", "shortName": "oracle" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2013-3838", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Oracle SPARC Enterprise T \u0026 M Series Servers running Sun System Firmware before 6.7.13 for SPARC T1, 7.4.6.c for SPARC T2, 8.3.0.b for SPARC T3 \u0026 T4, 9.0.0.d for SPARC T5 and 9.0.1.e for SPARC M5 allows local users to affect availability via unknown vectors related to Sun System Firmware/Hypervisor." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85", "assignerShortName": "oracle", "cveId": "CVE-2013-3838", "datePublished": "2013-10-16T15:00:00Z", "dateReserved": "2013-06-03T00:00:00Z", "dateUpdated": "2024-09-16T18:38:45.748Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2263
Vulnerability from cvelistv5
Published
2011-07-20 23:00
Modified
2024-08-06 22:53
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Sun Integrated Lights Out Manager in Oracle SysFW 8.0.3.b or earlier for various Oracle SPARC T3, SPARC Netra T3, Sun Blade, and Sun Fire servers allows local users to affect confidentiality via unknown vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.us-cert.gov/cas/techalerts/TA11-201A.html | third-party-advisory, x_refsource_CERT | |
http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:17.334Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "TA11-201A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-07-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Sun Integrated Lights Out Manager in Oracle SysFW 8.0.3.b or earlier for various Oracle SPARC T3, SPARC Netra T3, Sun Blade, and Sun Fire servers allows local users to affect confidentiality via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "43595867-4340-4103-b7a2-9a5208d29a85", "shortName": "oracle" }, "references": [ { "name": "TA11-201A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2011-2263", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Sun Integrated Lights Out Manager in Oracle SysFW 8.0.3.b or earlier for various Oracle SPARC T3, SPARC Netra T3, Sun Blade, and Sun Fire servers allows local users to affect confidentiality via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "TA11-201A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85", "assignerShortName": "oracle", "cveId": "CVE-2011-2263", "datePublished": "2011-07-20T23:00:00", "dateReserved": "2011-06-02T00:00:00", "dateUpdated": "2024-08-06T22:53:17.334Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2011-07-20 23:55
Modified
2024-11-21 01:27
Severity ?
Summary
Unspecified vulnerability in Sun Integrated Lights Out Manager in Oracle SysFW 8.0.3.b or earlier for various Oracle SPARC T3, SPARC Netra T3, Sun Blade, and Sun Fire servers allows local users to affect confidentiality via unknown vectors.
References
▼ | URL | Tags | |
---|---|---|---|
secalert_us@oracle.com | http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html | Patch, Vendor Advisory | |
secalert_us@oracle.com | http://www.us-cert.gov/cas/techalerts/TA11-201A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-201A.html | US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
oracle | sysfw | * | |
oracle | sysfw | 6.0 | |
oracle | sysfw | 6.1 | |
oracle | sysfw | 6.2 | |
oracle | sysfw | 6.3 | |
oracle | sysfw | 6.4 | |
oracle | sysfw | 6.5 | |
oracle | sysfw | 6.6 | |
oracle | sysfw | 6.7 | |
oracle | sysfw | 7.0 | |
oracle | sysfw | 7.1 | |
oracle | sysfw | 7.2 | |
oracle | sysfw | 7.3 | |
oracle | sysfw | 7.4 | |
oracle | sysfw | 8.0 | |
oracle | netra_sparc_t3-1 | - | |
oracle | sparc_t3-1 | - | |
oracle | sparc_t3-1b | - | |
oracle | sparc_t3-3 | - | |
oracle | sparc_t3-4 | - | |
oracle | sun_blade_x6250 | - | |
oracle | sun_blade_x6270 | - | |
oracle | sun_blade_x6270_m2 | - | |
oracle | sun_blade_x6275 | - | |
oracle | sun_blade_x6275_m2 | - | |
oracle | sun_blade_x6440_m2 | - | |
oracle | sun_blade_x6450 | - | |
oracle | sun_fire_x2270 | - | |
oracle | sun_fire_x2270_m2 | - | |
oracle | sun_fire_x4170 | - | |
oracle | sun_fire_x4170_m2 | - | |
oracle | sun_fire_x4270 | - | |
oracle | sun_fire_x4270_m2 | - | |
oracle | sun_fire_x4275 | - | |
oracle | sun_fire_x4470 | - | |
oracle | sun_fire_x4470_m2 | - | |
oracle | sun_fire_x4540 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:sysfw:*:b:*:*:*:*:*:*", "matchCriteriaId": "7AD1DB1E-858C-4765-846D-1BA1A536D5CA", "versionEndIncluding": "8.0.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:sysfw:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B131F02A-5BD4-48D7-81FD-2485805D8483", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:sysfw:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "4F6D5BDE-C140-400A-9998-F46ECF82F85B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:sysfw:6.2:*:*:*:*:*:*:*", "matchCriteriaId": "18534091-F467-4290-8F18-28152F07C9EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:sysfw:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "5188BCD2-ACD2-4829-8FD2-6757A8308010", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:sysfw:6.4:*:*:*:*:*:*:*", "matchCriteriaId": "A597C28E-ED86-455B-9DEA-EB53238FA03A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:sysfw:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "D46DED05-A4EE-4CC0-B604-4003BA2CBE57", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:sysfw:6.6:*:*:*:*:*:*:*", "matchCriteriaId": "A9C2851C-6DEE-425D-B6E4-B1F39C32977A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:sysfw:6.7:*:*:*:*:*:*:*", "matchCriteriaId": "A8EF6C36-1B34-4BBE-B593-1F5F497B72D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:sysfw:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "5BC5CCBC-7D2D-49A5-86FB-1AFEE3764179", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:sysfw:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "53BDF8D3-4563-4F6E-9F58-BD0317846771", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:sysfw:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "A3E9D531-8D93-456A-BEFC-FB3A9F7267CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:sysfw:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "49ABEC3F-ECE5-4E9D-B348-86F11DBD073D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:sysfw:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "EBE533AD-1309-43D2-B9A3-978FD26BC835", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:sysfw:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C574BB15-9432-4455-AB00-72783DE75CFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:oracle:netra_sparc_t3-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B04C334-C863-47C0-A180-26254ACB1065", "vulnerable": true }, { "criteria": "cpe:2.3:h:oracle:sparc_t3-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "92144B15-6A30-4451-9CB8-3E94E2550F4D", "vulnerable": true }, { "criteria": "cpe:2.3:h:oracle:sparc_t3-1b:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF19DEF8-E1BC-48BD-9852-071F57D31B07", "vulnerable": true }, { "criteria": "cpe:2.3:h:oracle:sparc_t3-3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0290C800-9FFE-44C9-BA63-3CCEB56250B7", "vulnerable": true }, { "criteria": "cpe:2.3:h:oracle:sparc_t3-4:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4164246-50E7-46E5-BCB9-1CE4913361E4", "vulnerable": true }, { "criteria": "cpe:2.3:h:oracle:sun_blade_x6250:-:*:*:*:*:*:*:*", "matchCriteriaId": "C180463B-0C48-4989-BBB7-BD5D9B949285", "vulnerable": true }, { "criteria": "cpe:2.3:h:oracle:sun_blade_x6270:-:*:*:*:*:*:*:*", "matchCriteriaId": "1678A9BF-19FF-4639-8BD4-CD2818B39B61", "vulnerable": true }, { "criteria": "cpe:2.3:h:oracle:sun_blade_x6270_m2:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FAA235C-C9A3-4261-86FF-41141BB7F49C", "vulnerable": true }, { "criteria": "cpe:2.3:h:oracle:sun_blade_x6275:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6AFBF58-ED2E-4774-8AD7-256F608992A2", "vulnerable": true }, { "criteria": "cpe:2.3:h:oracle:sun_blade_x6275_m2:-:*:*:*:*:*:*:*", "matchCriteriaId": "614AEA87-314B-4407-B29B-A36BDF354DE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:oracle:sun_blade_x6440_m2:-:*:*:*:*:*:*:*", "matchCriteriaId": "28F670BC-6724-45C0-B2E5-40CF7ED6439D", "vulnerable": true }, { "criteria": "cpe:2.3:h:oracle:sun_blade_x6450:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC4783DA-66FC-4E1B-99EF-39B0845AA820", "vulnerable": true }, { "criteria": "cpe:2.3:h:oracle:sun_fire_x2270:-:*:*:*:*:*:*:*", "matchCriteriaId": "13FAE7CC-0071-4C92-B423-D557678FEAA9", "vulnerable": true }, { "criteria": "cpe:2.3:h:oracle:sun_fire_x2270_m2:-:*:*:*:*:*:*:*", "matchCriteriaId": "B769E6C9-70FB-4564-9B89-EFBD4227CF6F", "vulnerable": true }, { "criteria": "cpe:2.3:h:oracle:sun_fire_x4170:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A15BDBE-0318-442B-8181-6DEE3B642892", "vulnerable": true }, { "criteria": "cpe:2.3:h:oracle:sun_fire_x4170_m2:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B7B8BA3-B518-4131-87BD-CFC855AB9C16", "vulnerable": true }, { "criteria": "cpe:2.3:h:oracle:sun_fire_x4270:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7278A0A-6189-467B-93C9-06D4029466ED", "vulnerable": true }, { "criteria": "cpe:2.3:h:oracle:sun_fire_x4270_m2:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF783139-8E39-4CA9-B782-BD9E9458D321", "vulnerable": true }, { "criteria": "cpe:2.3:h:oracle:sun_fire_x4275:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAA29E64-2F32-4CEE-A270-A086479DB81C", "vulnerable": true }, { "criteria": "cpe:2.3:h:oracle:sun_fire_x4470:-:*:*:*:*:*:*:*", "matchCriteriaId": "84401A7C-B1E5-4D3C-8C3D-B70F9C6CA7F8", "vulnerable": true }, { "criteria": "cpe:2.3:h:oracle:sun_fire_x4470_m2:-:*:*:*:*:*:*:*", "matchCriteriaId": "59BA2C0F-31F3-4F6B-80AF-95BD8E26F389", "vulnerable": true }, { "criteria": "cpe:2.3:h:oracle:sun_fire_x4540:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6FD82B6-FA2E-47F6-94A8-16D0CF1AED2F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Sun Integrated Lights Out Manager in Oracle SysFW 8.0.3.b or earlier for various Oracle SPARC T3, SPARC Netra T3, Sun Blade, and Sun Fire servers allows local users to affect confidentiality via unknown vectors." }, { "lang": "es", "value": "Vulnerabilidad no especificada en Sun Integrated Lights Out Manager en Oracle SysFW v8.0.3.b o anteriores para varios Oracle SPARC T3, SPARC Netra T3, Sun Blade, y servidores Sun Fire permite a usuarios locales comprometer la confidencialidad mediante vectores desconocidos." } ], "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html\r\n\r\n\u0027CVE-2011-2263: Specific products affected are: SPARC T3-1, SPARC T3-1B, SPARC T3-3, SPARC T3-4, Netra SPARC T3-1, Sun Blade X6250, Sun Blade x6270, Sun Blade x6270 M2, Sun Blade X6275, Sun Blade X6275 M2, Sun Blade X6440 M2, Sun Blade X6450, Sun Fire X2270 M2, Sun Fire X2270, Sun Fire X4170 M2, Sun Fire X4170, Sun Fire X4270 M2, Sun Fire X4270, Sun Fire X4275, Sun Fire x4470 M2, Sun Fire x4470, Sun Fire x4540\u0027", "id": "CVE-2011-2263", "lastModified": "2024-11-21T01:27:54.820", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-07-20T23:55:01.787", "references": [ { "source": "secalert_us@oracle.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html" }, { "source": "secalert_us@oracle.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html" } ], "sourceIdentifier": "secalert_us@oracle.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-10-16 15:55
Modified
2024-11-21 01:54
Severity ?
Summary
Unspecified vulnerability in Oracle SPARC Enterprise T & M Series Servers running Sun System Firmware before 6.7.13 for SPARC T1, 7.4.6.c for SPARC T2, 8.3.0.b for SPARC T3 & T4, 9.0.0.d for SPARC T5 and 9.0.1.e for SPARC M5 allows local users to affect availability via unknown vectors related to Sun System Firmware/Hypervisor.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
oracle | sun_system_firmware | * | |
oracle | sun_system_firmware | * | |
oracle | sun_system_firmware | * | |
oracle | sun_system_firmware | * | |
oracle | sun_system_firmware | * | |
oracle | sparc_enterprise_m8000_server | - | |
oracle | sparc_enterprise_m9000_server | - | |
oracle | sparc_t3-1 | - | |
oracle | sparc_t3-1b | - | |
oracle | sparc_t3-2 | - | |
oracle | sparc_t3-3 | - | |
oracle | sparc_t3-4 | - | |
oracle | sparc_t4-1 | - | |
oracle | sparc_t4-1b | - | |
oracle | sparc_t4-2 | - | |
oracle | sparc_t4-4 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:oracle:sun_system_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFC9F1F7-FEF5-4414-84A3-3E1F2A8F4A18", "versionEndIncluding": "6.7.12", "vulnerable": true }, { "criteria": "cpe:2.3:o:oracle:sun_system_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "064CEF82-1B1F-4618-85B8-4C2539DD6D53", "versionEndIncluding": "7.4.6", "vulnerable": true }, { "criteria": "cpe:2.3:o:oracle:sun_system_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C1717F2-CB0C-43CA-BE77-C1ECA99C1D63", "versionEndIncluding": "8.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:oracle:sun_system_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F13B7C58-632E-4E03-A975-1360C34C1924", "versionEndIncluding": "9.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:oracle:sun_system_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB3FF26C-F1C8-4A5F-99A8-6EEB3C266F15", "versionEndIncluding": "9.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:oracle:sparc_enterprise_m8000_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F528DC3-ADBB-4612-A8C0-A4B806E5BB44", "vulnerable": true }, { "criteria": "cpe:2.3:h:oracle:sparc_enterprise_m9000_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0050034-1E95-4724-B359-87C56D0198C4", "vulnerable": true }, { "criteria": "cpe:2.3:h:oracle:sparc_t3-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "92144B15-6A30-4451-9CB8-3E94E2550F4D", "vulnerable": true }, { "criteria": "cpe:2.3:h:oracle:sparc_t3-1b:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF19DEF8-E1BC-48BD-9852-071F57D31B07", "vulnerable": true }, { "criteria": "cpe:2.3:h:oracle:sparc_t3-2:-:*:*:*:*:*:*:*", "matchCriteriaId": "E21A92F3-00AF-4650-8219-812C71EE3B2C", "vulnerable": true }, { "criteria": "cpe:2.3:h:oracle:sparc_t3-3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0290C800-9FFE-44C9-BA63-3CCEB56250B7", "vulnerable": true }, { "criteria": "cpe:2.3:h:oracle:sparc_t3-4:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4164246-50E7-46E5-BCB9-1CE4913361E4", "vulnerable": true }, { "criteria": "cpe:2.3:h:oracle:sparc_t4-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0058692-28E1-4948-AF49-DE8D20CCB5DB", "vulnerable": true }, { "criteria": "cpe:2.3:h:oracle:sparc_t4-1b:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BD7449E-0FF8-42ED-AB4B-D3BEE7B07E31", "vulnerable": true }, { "criteria": "cpe:2.3:h:oracle:sparc_t4-2:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD9F7D61-E06B-4F1D-9145-4B59868DFED4", "vulnerable": true }, { "criteria": "cpe:2.3:h:oracle:sparc_t4-4:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F61C1C4-90D0-4D88-8282-741475C6A9DB", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Oracle SPARC Enterprise T \u0026 M Series Servers running Sun System Firmware before 6.7.13 for SPARC T1, 7.4.6.c for SPARC T2, 8.3.0.b for SPARC T3 \u0026 T4, 9.0.0.d for SPARC T5 and 9.0.1.e for SPARC M5 allows local users to affect availability via unknown vectors related to Sun System Firmware/Hypervisor." }, { "lang": "es", "value": "Vulnerabilidad no especificada en Oracle SPARC Enterprise T \u0026 Servers Serie M con Sun System Firmware 6.7.13 anterior a SPARC T1, 7.4.6.c para SPARC T2, 8.3.0.b para SPARC T3 y T4, 9.0.0.d para SPARC T5 y 9.0.1.e para SPARC M5 permite a usuarios locales afectar a la disponibilidad a trav\u00e9s de vectores desconocidos relacionados con Sun System Firmware/Hypervisor." } ], "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html\n\n\"CVE-2013-3838 applies to Sun System Firmware before 6.7.13 for SPARC T1, 7.4.6.c for SPARC T2, 8.3.0.b for SPARC T3 \u0026 T4, 9.0.0.d for SPARC T5 and 9.0.1.e for SPARC M5.\"+", "id": "CVE-2013-3838", "lastModified": "2024-11-21T01:54:23.833", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 1.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-10-16T15:55:33.990", "references": [ { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html" } ], "sourceIdentifier": "secalert_us@oracle.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }