First published: Thu Dec 20 2007(Updated: )
Solaris 9, with Solaris Auditing enabled and certain patches for sshd installed, can generate audit records with an audit-ID of 0 even when the user logging into ssh is not root, which makes it easier for attackers to avoid detection and can make it more difficult to conduct forensics activities.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Solaris SPARC | =9 | |
Oracle Solaris SPARC | =9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-6505 is considered a medium severity vulnerability due to its exploitation potential and impact on auditing processes.
CVE-2007-6505 allows non-root users to generate audit records with an audit-ID of 0, complicating detection and forensics.
CVE-2007-6505 affects Solaris 9 on both SPARC and x86 architectures.
Mitigation for CVE-2007-6505 includes applying the latest security patches provided by Oracle for Solaris 9.
CVE-2007-6505 is not a zero-day exploit as it has been publicly disclosed and documented since 2007.