fkie_cve-2008-5661
Vulnerability from fkie_nvd
Published
2008-12-17 20:30
Modified
2025-04-09 00:30
Severity ?
Summary
The IPv4 Forwarding feature in Sun Solaris 10 and OpenSolaris snv_47 through snv_82, with certain patches installed, allows remote attackers to cause a denial of service (panic) via unknown vectors that trigger a NULL pointer dereference.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sun:opensolaris:snv_47:*:sparc:*:*:*:*:*", "matchCriteriaId": "078D7F9B-E2A8-4DC2-AD2E-FB0865091ECE", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_47:*:x86:*:*:*:*:*", "matchCriteriaId": "CD289DC7-2779-47B6-B44C-6B3C6EC5F93D", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_48:*:sparc:*:*:*:*:*", "matchCriteriaId": "0FE35481-4580-4208-A6FA-7A0429D73793", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_48:*:x86:*:*:*:*:*", "matchCriteriaId": "8163CA38-BF92-4F02-85EA-E6EFD5A500F3", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_49:*:sparc:*:*:*:*:*", "matchCriteriaId": "84652D52-B89B-4127-9670-5FCDBBDE8053", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_49:*:x86:*:*:*:*:*", "matchCriteriaId": "6043F9A0-5FA1-4101-8452-E7A8652FE79C", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_50:*:sparc:*:*:*:*:*", "matchCriteriaId": "CE51773E-C93C-4549-907A-5AF380F24B7C", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_50:*:x86:*:*:*:*:*", "matchCriteriaId": "3CDC9FF7-5FC1-4473-920F-37105009BF2D", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_51:*:sparc:*:*:*:*:*", "matchCriteriaId": "D98D67BD-6C94-4E77-B6AC-3199C281A1BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_51:*:x86:*:*:*:*:*", "matchCriteriaId": "6789ECB3-925F-4E16-9213-12FE3EB191CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_52:*:sparc:*:*:*:*:*", "matchCriteriaId": "914CF995-B18B-43D2-AA9D-B486E768AFD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_52:*:x86:*:*:*:*:*", "matchCriteriaId": "9D309DD1-37A6-49BC-B8DB-6260D47DDD71", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_53:*:sparc:*:*:*:*:*", "matchCriteriaId": "922EE565-E3C2-44BA-9970-224FF874AE4A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_53:*:x86:*:*:*:*:*", "matchCriteriaId": "28CBB9C9-54DB-4259-9D9F-C617E23C4221", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_54:*:sparc:*:*:*:*:*", "matchCriteriaId": "F8E26C9E-F87E-4484-89B9-42471F8410B6", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_54:*:x86:*:*:*:*:*", "matchCriteriaId": "FC09D568-2B1E-46A2-9029-B3850E5A1167", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_55:*:sparc:*:*:*:*:*", "matchCriteriaId": "79E3D7EB-5B19-4D35-BE23-AB477E08FFEC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_55:*:x86:*:*:*:*:*", "matchCriteriaId": "96E164AF-3346-4FF3-875A-5EA239F50BDB", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_56:*:sparc:*:*:*:*:*", "matchCriteriaId": "B06BC6D2-385C-4BC4-9AAB-EEFF600DF2EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_56:*:x86:*:*:*:*:*", "matchCriteriaId": "D3B05762-2B56-41A1-B424-54A5CFFEC47A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_57:*:sparc:*:*:*:*:*", "matchCriteriaId": "15B2F895-CBFB-4E19-AF7E-7011EB0A372E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_57:*:x86:*:*:*:*:*", "matchCriteriaId": "A6442F9F-E16E-4146-BA6D-92BBCB71EC63", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_58:*:sparc:*:*:*:*:*", "matchCriteriaId": "311F14F7-EE01-4525-8C58-8BF650246026", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_58:*:x86:*:*:*:*:*", "matchCriteriaId": "4D10B1B2-698B-4F02-9392-682AF78EC633", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_59:*:sparc:*:*:*:*:*", "matchCriteriaId": "BC339789-4DC4-4A82-A1BE-CE59AC0D657F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_59:*:x86:*:*:*:*:*", "matchCriteriaId": "B69EECEC-86DB-4F35-9204-B0931ABC28DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_60:*:sparc:*:*:*:*:*", "matchCriteriaId": "CF7C1C94-48A4-4F46-A337-92EB7B8C6837", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_60:*:x86:*:*:*:*:*", "matchCriteriaId": "8130EE2C-DC76-4BE3-B2DC-6FC540CD5277", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_61:*:sparc:*:*:*:*:*", "matchCriteriaId": "14C63D62-F6D4-4616-AF05-5E3387D63BC1", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_61:*:x86:*:*:*:*:*", "matchCriteriaId": "CFC0C58B-980F-4C65-97BF-67C9E731BA11", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_62:*:sparc:*:*:*:*:*", "matchCriteriaId": "6624E8DE-696A-402C-9088-CFE8ECC086BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_62:*:x86:*:*:*:*:*", "matchCriteriaId": "B0F7D5DE-0491-47F6-834A-0FA208213010", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_63:*:sparc:*:*:*:*:*", "matchCriteriaId": "04B5A32E-3D42-4500-A2BE-7ADFF3903386", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_63:*:x86:*:*:*:*:*", "matchCriteriaId": "8071BF6A-789C-4DB7-8247-B86EA34DB9B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_64:*:sparc:*:*:*:*:*", "matchCriteriaId": "244EBFE7-05DD-4BBB-9793-310D71AC1721", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_64:*:x86:*:*:*:*:*", "matchCriteriaId": "EECE627D-3AE8-4207-87A8-F95746F693F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_65:*:sparc:*:*:*:*:*", "matchCriteriaId": "325EF996-AB8D-48CE-9A59-D338C823D927", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_65:*:x86:*:*:*:*:*", "matchCriteriaId": "E6950900-2293-4DA0-89E8-DAFABBF423DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_66:*:sparc:*:*:*:*:*", "matchCriteriaId": "0EC8063A-1266-4443-B404-BB9C4D265B75", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_66:*:x86:*:*:*:*:*", "matchCriteriaId": "AB4764E7-E772-45BC-896B-C7BE287A8EAE", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_67:*:sparc:*:*:*:*:*", "matchCriteriaId": "424C989F-99C8-4337-AF15-4A51329938DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_67:*:x86:*:*:*:*:*", "matchCriteriaId": "4122F0EE-3A2F-456F-B8CF-82565F8DCD4E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_68:*:sparc:*:*:*:*:*", "matchCriteriaId": "DA7ED4ED-938F-44B7-85ED-AFA6728DFE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_68:*:x86:*:*:*:*:*", "matchCriteriaId": "5686A925-4978-4883-8DC1-978B09DC9489", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_69:*:sparc:*:*:*:*:*", "matchCriteriaId": "43F1BFC7-BA9F-44EE-BD08-F70DFB2CFB33", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_69:*:x86:*:*:*:*:*", "matchCriteriaId": "13B81B14-84C8-468A-AE11-30C4CB85E6F5", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_70:*:sparc:*:*:*:*:*", "matchCriteriaId": "059880C5-B7FF-492D-97CA-FBC174FF8BF1", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_70:*:x86:*:*:*:*:*", "matchCriteriaId": "6395A3A9-97F2-4C88-B6D6-70DB2ACDC70D", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_71:*:sparc:*:*:*:*:*", "matchCriteriaId": "5AC08000-2E71-465A-85F0-1AB8D1A51762", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_71:*:x86:*:*:*:*:*", "matchCriteriaId": "8CC54F69-E96A-482F-B43D-2E3A7EC90E47", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_72:*:sparc:*:*:*:*:*", "matchCriteriaId": "D5CCA31F-9BF3-4E6F-B72C-1A54AFB1D07B", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_72:*:x86:*:*:*:*:*", "matchCriteriaId": "CDC656B7-529A-4963-955D-301A11CF5D09", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_73:*:sparc:*:*:*:*:*", "matchCriteriaId": "C5D58609-62CB-446F-995E-FD334B89F6BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_73:*:x86:*:*:*:*:*", "matchCriteriaId": "506769C9-D306-4EEC-BE2E-6E501CBE90BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_74:*:sparc:*:*:*:*:*", "matchCriteriaId": "D45394E8-BE87-4BAC-89CE-B1F0E4BBBE94", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_74:*:x86:*:*:*:*:*", "matchCriteriaId": "37540C8F-FCC1-42DA-8EE3-D3E4FA5B315C", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_75:*:sparc:*:*:*:*:*", "matchCriteriaId": "1B0F8F99-99B0-4A01-884B-442CEF8D061A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_75:*:x86:*:*:*:*:*", "matchCriteriaId": "7AD5054B-18D8-44AE-AA4F-A07D12A63E55", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_76:*:sparc:*:*:*:*:*", "matchCriteriaId": "0CCE3456-0BA0-4303-B7CE-22B63EE86F03", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_76:*:x86:*:*:*:*:*", "matchCriteriaId": "4BAD68C2-4AA2-4346-B279-51206E0651FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_77:*:sparc:*:*:*:*:*", "matchCriteriaId": "A4027F7E-F867-4DC7-BA53-08D7B36E13F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_77:*:x86:*:*:*:*:*", "matchCriteriaId": "96F3D4B3-7828-40EB-BD67-A3CD5B210787", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_78:*:sparc:*:*:*:*:*", "matchCriteriaId": "906228D3-2561-45C0-A79D-BAAC9F1AD7ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_78:*:x86:*:*:*:*:*", "matchCriteriaId": "C166F9F7-E8AB-4BA1-AEB6-1E7964976801", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_79:*:sparc:*:*:*:*:*", "matchCriteriaId": "7BE4DE93-D189-4528-89DA-17E9325457E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_79:*:x86:*:*:*:*:*", "matchCriteriaId": "12B6730F-6CF1-4990-953F-1CC76D78B618", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_80:*:sparc:*:*:*:*:*", "matchCriteriaId": "C4D46760-1924-4713-963E-E4A9AD085394", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_80:*:x86:*:*:*:*:*", "matchCriteriaId": "03B96DE7-70BD-4CD8-9574-8C024E51E91C", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_81:*:sparc:*:*:*:*:*", "matchCriteriaId": "B579204A-62EB-4D86-A22B-0726B9CB88DE", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_81:*:x86:*:*:*:*:*", "matchCriteriaId": "52D5BB76-FF5E-4BBA-A2D0-00EB574B9104", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_82:*:sparc:*:*:*:*:*", "matchCriteriaId": "636FD13F-0A30-4B03-8AEC-ED225FC71251", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_82:*:x86:*:*:*:*:*", "matchCriteriaId": "C29B1192-D709-48FB-816C-B4F30460E957", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:solaris:10:*:sparc:*:*:*:*:*", "matchCriteriaId": "7FBA68F0-4577-46F5-A754-D365B6EFF872", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:solaris:10:*:x86:*:*:*:*:*", "matchCriteriaId": "E79CFAA6-A08A-4C70-A3D9-B02C29A17FF2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The IPv4 Forwarding feature in Sun Solaris 10 and OpenSolaris snv_47 through snv_82, with certain patches installed, allows remote attackers to cause a denial of service (panic) via unknown vectors that trigger a NULL pointer dereference." }, { "lang": "es", "value": "La caracter\u00edstica IPv4 Forwarding en Sun Solaris v10 y OpenSolaris desde snv_47 hasta snv_82, con ciertos parches instalados, permite a atacantes remotos producir una denegacion de servicio (p\u00e1nico) a trav\u00e9s de vectores desconocidos que disparan una referencia a puntero nula." } ], "evaluatorComment": "Per http://sunsolve.sun.com/search/document.do?assetkey=1-26-241126-1\r\n\r\n\"Note 3: A system is only affected by this issue if it is configured to use IPv4, has a network route with a gateway of 127.0.0.1, and the route does not have the blackhole flag set.\"", "id": "CVE-2008-5661", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 5.4, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-12-17T20:30:01.077", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33148" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-241126-1" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/32861" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1021413" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47378" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33148" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-241126-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/32861" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1021413" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47378" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…