First published: Tue Apr 18 2023(Updated: )
Vulnerability in the Oracle Solaris product of Oracle Systems (component: NSSwitch). Supported versions that are affected are 10 and 11. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks of this vulnerability can result in takeover of Oracle Solaris. CVSS 3.1 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Solaris SPARC | =10 | |
Oracle Solaris SPARC | =11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-21896.
The NSSwitch component of Oracle Solaris is affected.
Versions 10 and 11 of Oracle Solaris are affected.
The vulnerability has a severity level of high.
A low privileged attacker with logon access to the Oracle Solaris infrastructure can exploit the vulnerability.
Updating to the latest version of Oracle Solaris is recommended to fix the vulnerability.
You can find more information about the vulnerability at the following link: [Oracle Security Alerts](https://www.oracle.com/security-alerts/cpuapr2023.html).