First published: Thu Jul 12 2007(Updated: )
The process scheduler in the Sun Solaris kernel does not make use of the process statistics kept by the kernel and performs scheduling based upon CPU billing gathered from periodic process sampling ticks, which allows local users to cause a denial of service (CPU consumption), as described in "Secretly Monopolizing the CPU Without Superuser Privileges."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Solaris SPARC |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-3723 is classified as a high severity vulnerability due to its potential for causing a denial of service through excessive CPU consumption.
To mitigate CVE-2007-3723, users should apply the appropriate security patches provided by Oracle for Solaris.
CVE-2007-3723 affects local users of the Sun Solaris operating system who can manipulate process scheduling.
CVE-2007-3723 can enable local denial of service attacks by causing high CPU consumption.
CVE-2007-3723 was disclosed in 2007 and remains a concern for the security of Solaris systems.