First published: Wed Oct 05 2011(Updated: )
The labeled networking implementation in Solaris Trusted Extensions in Sun Solaris 10 and OpenSolaris snv_39 through snv_67, when a labeled zone is in the installed state, allows remote authenticated users to bypass a Mandatory Access Control (MAC) policy and obtain access to the global zone.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Solaris and Zettabyte File System (ZFS) | =build_snv_59 | |
Oracle Solaris and Zettabyte File System (ZFS) | =build_snv_47 | |
Oracle Solaris and Zettabyte File System (ZFS) | =build_snv_39 | |
Oracle Solaris and Zettabyte File System (ZFS) | =build_snv_67 | |
Sun SunOS | =5.10 | |
Oracle Solaris and Zettabyte File System (ZFS) | =build_snv_64 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-7300 is classified as a high severity vulnerability due to its ability to bypass Mandatory Access Control in Solaris.
To fix CVE-2008-7300, update your Solaris system to a version that eliminates this vulnerability.
CVE-2008-7300 affects users of Solaris Trusted Extensions in Sun Solaris 10 and certain OpenSolaris builds.
CVE-2008-7300 is a security vulnerability related to access control exploitation.
Yes, CVE-2008-7300 can be exploited by remote authenticated users.