CNVD-2016-09785

Vulnerability from cnvd - Published: 2016-10-24
VLAI Severity ?
Title
Oracle Solaris Cluster组件存在未明漏洞
Description
Oracle Sun Systems Products Suite是美国甲骨文(Oracle)公司的一款Sun系统产品套件。Solaris Cluster是其中的一个为Oracle Sun Solaris操作系统提供的企业级集群组件。 Oracle Sun Systems Products Suite的Solaris Cluster组件3.3版本和4.3版本中的Cluster check files子组件存在本地安全漏洞。攻击者可利用该漏洞更新、插入或删除数据,影响数据的完整性。
Severity
Patch Name
Oracle Solaris Cluster组件存在未明漏洞的补丁
Patch Description
Oracle Sun Systems Products Suite是美国甲骨文(Oracle)公司的一款Sun系统产品套件。Solaris Cluster是其中的一个为Oracle Sun Solaris操作系统提供的企业级集群组件。 Oracle Sun Systems Products Suite的Solaris Cluster组件3.3版本和4.3版本中的Cluster check files子组件存在本地安全漏洞。攻击者可利用该漏洞更新、插入或删除数据,影响数据的完整性。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

用户可参考如下供应商提供的安全公告获得补丁信息: http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html

Reference
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
Impacted products
Name
['Oracle Solaris Cluster 3.3', 'Oracle Solaris Cluster 4.3']
Show details on source website

{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2016-5525"
    }
  },
  "description": "Oracle Sun Systems Products Suite\u662f\u7f8e\u56fd\u7532\u9aa8\u6587\uff08Oracle\uff09\u516c\u53f8\u7684\u4e00\u6b3eSun\u7cfb\u7edf\u4ea7\u54c1\u5957\u4ef6\u3002Solaris Cluster\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u4e3aOracle Sun Solaris\u64cd\u4f5c\u7cfb\u7edf\u63d0\u4f9b\u7684\u4f01\u4e1a\u7ea7\u96c6\u7fa4\u7ec4\u4ef6\u3002\r\n\r\nOracle Sun Systems Products Suite\u7684Solaris Cluster\u7ec4\u4ef63.3\u7248\u672c\u548c4.3\u7248\u672c\u4e2d\u7684Cluster check files\u5b50\u7ec4\u4ef6\u5b58\u5728\u672c\u5730\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u66f4\u65b0\u3001\u63d2\u5165\u6216\u5220\u9664\u6570\u636e\uff0c\u5f71\u54cd\u6570\u636e\u7684\u5b8c\u6574\u6027\u3002",
  "discovererName": "Oracle",
  "formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u4f9b\u5e94\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttp://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2016-09785",
  "openTime": "2016-10-24",
  "patchDescription": "Oracle Sun Systems Products Suite\u662f\u7f8e\u56fd\u7532\u9aa8\u6587\uff08Oracle\uff09\u516c\u53f8\u7684\u4e00\u6b3eSun\u7cfb\u7edf\u4ea7\u54c1\u5957\u4ef6\u3002Solaris Cluster\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u4e3aOracle Sun Solaris\u64cd\u4f5c\u7cfb\u7edf\u63d0\u4f9b\u7684\u4f01\u4e1a\u7ea7\u96c6\u7fa4\u7ec4\u4ef6\u3002\r\n\r\nOracle Sun Systems Products Suite\u7684Solaris Cluster\u7ec4\u4ef63.3\u7248\u672c\u548c4.3\u7248\u672c\u4e2d\u7684Cluster check files\u5b50\u7ec4\u4ef6\u5b58\u5728\u672c\u5730\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u66f4\u65b0\u3001\u63d2\u5165\u6216\u5220\u9664\u6570\u636e\uff0c\u5f71\u54cd\u6570\u636e\u7684\u5b8c\u6574\u6027\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Oracle Solaris Cluster\u7ec4\u4ef6\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Oracle Solaris Cluster 3.3",
      "Oracle Solaris Cluster 4.3"
    ]
  },
  "referenceLink": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
  "serverity": "\u4f4e",
  "submitTime": "2016-10-20",
  "title": "Oracle Solaris Cluster\u7ec4\u4ef6\u5b58\u5728\u672a\u660e\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…