First published: Mon Apr 24 2017(Updated: )
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Smartcard Libraries). The supported version that is affected is 11.3. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Solaris as well as unauthorized update, insert or delete access to some of Solaris accessible data and unauthorized read access to a subset of Solaris accessible data. CVSS 3.0 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Solaris SPARC | =11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3551 is categorized as an easily exploitable vulnerability that allows attackers with low privileges to compromise Solaris systems.
To fix CVE-2017-3551, users should apply the latest patches released by Oracle for Solaris version 11.3.
CVE-2017-3551 affects users running Oracle Solaris 11.3 with the Smartcard Libraries component.
Exploitation of CVE-2017-3551 can lead to unauthorized access and compromise of the Solaris environment.
There are no official workarounds provided for CVE-2017-3551, and applying patches is recommended for mitigation.