First published: Thu Jun 22 2017(Updated: )
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Solaris accessible data as well as unauthorized read access to a subset of Solaris accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Solaris. CVSS 3.0 Base Score 5.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Solaris SPARC | =10 | |
Oracle Solaris SPARC | =11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3630 is considered an easily exploitable vulnerability with a low privilege requirement.
To fix CVE-2017-3630, apply the latest security patch provided by Oracle for Solaris 10 and 11.
Oracle Solaris users running versions 10 and 11 are affected by CVE-2017-3630.
No, CVE-2017-3630 requires local access to the infrastructure where Solaris executes for exploitation.
CVE-2017-3630 impacts the Solaris component of the Oracle Sun Systems Products Suite, specifically its kernel.