First published: Mon Oct 09 2006(Updated: )
Sun Solaris 10 before 20061006 uses "incorrect and insufficient permission checks" that allow local users to intercept or spoof packets by creating a raw socket on a link aggregation (network device aggregation).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Solaris and Zettabyte File System (ZFS) | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-5213 is categorized with high severity due to its potential for local users to intercept or spoof network packets.
To fix CVE-2006-5213, update your Solaris 10 system to a version released after 20061006 that addresses the insufficient permission checks.
Local users of Sun Solaris 10 prior to the patch release on October 6, 2006, are affected by CVE-2006-5213.
CVE-2006-5213 allows local users to perform packet interception and spoofing attacks by creating raw sockets.
CVE-2006-5213 specifically affects the Solaris 10 operating system on SPARC architecture.