First published: Tue Aug 08 2017(Updated: )
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: CDE Calendar). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows unauthenticated attacker with network access via TCP to compromise Solaris. Successful attacks of this vulnerability can result in takeover of Solaris. Note: CVE-2017-3632 is assigned to the "EASYSTREET" vulnerability. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Solaris SPARC | =10 | |
Oracle Solaris SPARC | =11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3632 is classified as a high severity vulnerability due to its potential for unauthenticated remote exploitation.
To fix CVE-2017-3632, apply the latest security patches provided by Oracle for Solaris versions 10 and 11.
CVE-2017-3632 affects Oracle Solaris versions 10 and 11 specifically in the CDE Calendar component.
Yes, CVE-2017-3632 can be easily exploited by an unauthenticated attacker with network access via TCP.
Exploitation of CVE-2017-3632 may lead to unauthorized access and compromise of the Solaris system.