First published: Mon Jun 16 2008(Updated: )
Integer signedness error in the ip_set_srcfilter function in the IP Multicast Filter in uts/common/inet/ip/ip_multi.c in the kernel in Sun Solaris 10 and OpenSolaris before snv_92 allows local users to execute arbitrary code in other Solaris Zones via an SIOCSIPMSFILTER IOCTL request with a large value of the imsf->imsf_numsrc field, which triggers an out-of-bounds write of kernel memory. NOTE: this was reported as an integer overflow, but the root cause involves the bypass of a signed comparison.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Solaris SPARC | <=10 | |
Solaris | =10 | |
Sun SunOS | <=- |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2710 is considered to have a high severity due to the potential for local users to execute arbitrary code.
To mitigate CVE-2008-2710, apply the available patches from Oracle for Solaris versions affected by this vulnerability.
CVE-2008-2710 affects Sun Solaris 10 and OpenSolaris versions before snv_92 on SPARC architecture.
CVE-2008-2710 is an integer signedness error vulnerability that can lead to arbitrary code execution in Solaris Zones.
CVE-2008-2710 requires local access to the system, thus it cannot be exploited remotely.