First published: Tue Jan 17 2023(Updated: )
Vulnerability in the Oracle Solaris product of Oracle Systems (component: NSSwitch). Supported versions that are affected are 10 and 11. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Solaris, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Solaris accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Solaris. CVSS 3.1 Base Score 4.0 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:N/I:L/A:L).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Solaris | =10 | |
Oracle Solaris | =11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-21900 is a vulnerability in the Oracle Solaris product of Oracle Systems, specifically affecting versions 10 and 11.
CVE-2023-21900 has a severity rating of medium.
CVE-2023-21900 can be exploited by a high privileged attacker with network access via multiple protocols to compromise Oracle Solaris.
Versions 10 and 11 of Oracle Solaris are affected by CVE-2023-21900.
You can find more information about CVE-2023-21900 on the Oracle Security Alerts page: https://www.oracle.com/security-alerts/cpujan2023.html