Input validation error in Oracle Solaris - CVE-2018-3264

 

Input validation error in Oracle Solaris - CVE-2018-3264

Published: October 17, 2018 / Updated: August 8, 2020


Vulnerability identifier: #VU36527
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-3264
CWE-ID: CWE-20
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor: Oracle
Affected software:
Oracle Solaris

Detailed vulnerability description

The vulnerability allows a local authenticated user to manipulate or delete data.

Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). The supported version that is affected is 11.3. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Solaris accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Solaris. CVSS 3.0 Base Score 4.4 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L).


How to mitigate CVE-2018-3264

Install update from vendor's website.

Sources