First published: Tue Mar 18 2008(Updated: )
A certain incorrect Sun Solaris 10 image on SPARC Enterprise T5120 and T5220 servers has /etc/default/login and /etc/ssh/sshd_config files that configure root logins in a manner unintended by the vendor, which allows remote attackers to gain privileges via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sun SunOS | =5.10 | |
Sun Sparc Enterprise Server | =t5120 | |
Sun Sparc Enterprise Server | =t5220 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1369 has a high severity level due to its potential to allow remote attackers to gain root privileges.
To fix CVE-2008-1369, ensure that the /etc/default/login and /etc/ssh/sshd_config files are configured correctly to prevent unauthorized root logins.
CVE-2008-1369 affects Sun Solaris 10 systems running on SPARC Enterprise T5120 and T5220 servers.
CVE-2008-1369 can be exploited by remote attackers through unspecified vectors to gain elevated privileges.
There is no specific patch mentioned for CVE-2008-1369; proper configuration is recommended to mitigate the vulnerability.