CERTA-2001-AVI-152
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité de « patchadd » permet à un utilisateur mal intentionné d'écraser ou créer des fichiers sur le système.
Description
« patchadd » est un outil qui permet d'installer des correctifs ou mises à jour du système Solaris de Sun.
Une vulnérablité découverte dans cet outil permet à un utilisateur local non privilégié d'écraser ou de créer des fichiers sur l'arborescence du système vulnérable.
Solution
Des correctifs sont disponibles. Se référer au bulletin de sécurité de SUN (cf. section Documentation).
NoneImpacted products
References
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Sun Solaris 8.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Sun Solaris 7 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Sun Solaris 2.6 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\n\u00ab patchadd \u00bb est un outil qui permet d\u0027installer des correctifs ou mises\n\u00e0 jour du syst\u00e8me Solaris de Sun.\n\nUne vuln\u00e9rablit\u00e9 d\u00e9couverte dans cet outil permet \u00e0 un utilisateur local\nnon privil\u00e9gi\u00e9 d\u0027\u00e9craser ou de cr\u00e9er des fichiers sur l\u0027arborescence du\nsyst\u00e8me vuln\u00e9rable.\n\n## Solution\n\nDes correctifs sont disponibles. Se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de\nSUN (cf. section Documentation).\n",
"cves": [],
"links": [
{
"title": "Sun Alert Notification N\u02da40122 :",
"url": "http://sunsolve.Sun.COM/pub-cgi/retrieve.pl?doc=salert%2F40122\u0026zone_32=40122"
}
],
"reference": "CERTA-2001-AVI-152",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2001-11-26T00:00:00.000000"
}
],
"risks": [
{
"description": "Corruption de fichiers"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 de \u00ab patchadd \u00bb permet \u00e0 un utilisateur mal\nintentionn\u00e9 d\u0027\u00e9craser ou cr\u00e9er des fichiers sur le syst\u00e8me.\n",
"title": "Vuln\u00e9rabilit\u00e9 de \u00ab patchadd \u00bb sous Solaris",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin Sun Alert Notification N\u02da40122",
"url": null
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…