First published: Wed Oct 01 1997(Updated: )
Solaris sysdef command allows local users to read kernel memory, potentially leading to root privileges.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sun SunOS | =5.3 | |
Oracle Solaris SPARC | =2.4 | |
Oracle Solaris SPARC | =2.5.1 | |
Oracle Solaris SPARC | =2.5.1 | |
Oracle Solaris SPARC | =2.5 | |
Sun SunOS | =5.5 | |
Sun SunOS | =5.4 | |
Sun SunOS | =5.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-0295 is classified as a high severity vulnerability due to potential unauthorized access to kernel memory.
To fix CVE-1999-0295, ensure that systems are updated to the latest security patches provided by Oracle.
CVE-1999-0295 affects several versions of Solaris and SunOS, specifically 5.3, 2.4, and other specified versions.
Yes, CVE-1999-0295 can potentially allow local users to read kernel memory, which may lead to obtaining root privileges.
The most effective workaround for CVE-1999-0295 is to limit access to the sysdef command or to apply the relevant security patches immediately.