SB20200114131 - Multiple vulnerabilities in Oracle Solaris



SB20200114131 - Multiple vulnerabilities in Oracle Solaris

Published: January 14, 2020

Security Bulletin ID SB20200114131
Severity
Medium
Patch available
YES
Number of vulnerabilities 10
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 20% Low 80%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 10 secuirty vulnerabilities.


1) Improper input validation (CVE-ID: CVE-2019-9579)

The vulnerability allows a local authenticated user to manipulate data.

The vulnerability exists due to improper input validation within the SMB Server component in Oracle Solaris. A local authenticated user can exploit this vulnerability to manipulate data.


2) Improper input validation (CVE-ID: CVE-2020-2656)

The vulnerability allows a local authenticated user to read and manipulate data.

The vulnerability exists due to improper input validation within the X Window System component in Oracle Solaris. A local authenticated user can exploit this vulnerability to read and manipulate data.


3) Improper input validation (CVE-ID: CVE-2020-2664)

The vulnerability allows a local authenticated user to read and manipulate data.

The vulnerability exists due to improper input validation within the Filesystem component in Oracle Solaris. A local authenticated user can exploit this vulnerability to read and manipulate data.


4) Improper input validation (CVE-ID: CVE-2020-2647)

The vulnerability allows a local authenticated user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the Kernel component in Oracle Solaris. A local authenticated user can exploit this vulnerability to perform a denial of service (DoS) attack.


5) Improper input validation (CVE-ID: CVE-2020-2578)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The vulnerability exists due to improper input validation within the Kernel component in Oracle Solaris. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.


6) Improper input validation (CVE-ID: CVE-2020-2558)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The vulnerability exists due to improper input validation within the Kernel component in Oracle Solaris. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.


7) Improper input validation (CVE-ID: CVE-2020-2680)

The vulnerability allows a local privileged user to a crash the entire system.

The vulnerability exists due to improper input validation within the Filesystem component in Oracle Solaris. A local privileged user can exploit this vulnerability to a crash the entire system.


8) Improper input validation (CVE-ID: CVE-2020-2605)

The vulnerability allows a local authenticated user to damange or delete data.

The vulnerability exists due to improper input validation within the Filesystem component in Oracle Solaris. A local authenticated user can exploit this vulnerability to damange or delete data.


9) Improper input validation (CVE-ID: CVE-2020-2565)

The vulnerability allows a local authenticated user to execute arbitrary code.

The vulnerability exists due to improper input validation within the Consolidation Infrastructure component in Oracle Solaris. A local authenticated user can exploit this vulnerability to execute arbitrary code.


10) Improper input validation (CVE-ID: CVE-2020-2696)

The vulnerability allows a local authenticated user to execute arbitrary code.

The vulnerability exists due to improper input validation within the Common Desktop Environment component in Oracle Solaris. A local authenticated user can exploit this vulnerability to execute arbitrary code.


Remediation

Install update from vendor's website.