Описание
The labeled networking implementation in Solaris Trusted Extensions in Sun Solaris 10 and OpenSolaris snv_39 through snv_67, when a labeled zone is in the installed state, allows remote authenticated users to bypass a Mandatory Access Control (MAC) policy and obtain access to the global zone.
Ссылки
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:o:sun:opensolaris:build_snv_39:*:*:*:*:*:*:*
cpe:2.3:o:sun:opensolaris:build_snv_47:*:*:*:*:*:*:*
cpe:2.3:o:sun:opensolaris:build_snv_59:*:*:*:*:*:*:*
cpe:2.3:o:sun:opensolaris:build_snv_64:*:*:*:*:*:*:*
cpe:2.3:o:sun:opensolaris:build_snv_67:*:*:*:*:*:*:*
cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*
EPSS
Процентиль: 50%
0.00273
Низкий
8.5 High
CVSS2
Дефекты
CWE-264
Связанные уязвимости
github
больше 3 лет назад
The labeled networking implementation in Solaris Trusted Extensions in Sun Solaris 10 and OpenSolaris snv_39 through snv_67, when a labeled zone is in the installed state, allows remote authenticated users to bypass a Mandatory Access Control (MAC) policy and obtain access to the global zone.
EPSS
Процентиль: 50%
0.00273
Низкий
8.5 High
CVSS2
Дефекты
CWE-264