Sun Solaris libgss Unspecified Privilege Escalation Vulnerability
BID:13189
Info
Sun Solaris libgss Unspecified Privilege Escalation Vulnerability
| Bugtraq ID: | 13189 |
| Class: | Design Error |
| CVE: | |
| Remote: | No |
| Local: | Yes |
| Published: | Apr 15 2005 12:00AM |
| Updated: | Apr 15 2005 12:00AM |
| Credit: | Announced by the vendor. |
| Vulnerable: |
Sun Solaris 9_x86 Update 2 Sun Solaris 9_x86 Sun Solaris 9 Sun Solaris 8_x86 Sun Solaris 8_sparc Sun Solaris 7.0_x86 Sun Solaris 7.0 |
| Not Vulnerable: | |
Discussion
Sun Solaris libgss Unspecified Privilege Escalation Vulnerability
The Sun Solaris libgss library is prone to an unspecified local privilege escalation vulnerability. This may allow a local unprivileged user to load the Generic Security Service Application Program Interface (GSS-API).
The Sun Solaris libgss library is prone to an unspecified local privilege escalation vulnerability. This may allow a local unprivileged user to load the Generic Security Service Application Program Interface (GSS-API).
Exploit / POC
Sun Solaris libgss Unspecified Privilege Escalation Vulnerability
Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
Solution / Fix
Sun Solaris libgss Unspecified Privilege Escalation Vulnerability
Solution:
Sun has released fixes for this issue:
Sun Solaris 7.0_x86
Sun Solaris 9_x86
Sun Solaris 7.0
Sun Solaris 8_x86
Sun Solaris 8_sparc
Sun Solaris 9
Sun Solaris 9_x86 Update 2
Solution:
Sun has released fixes for this issue:
Sun Solaris 7.0_x86
Sun Solaris 9_x86
Sun Solaris 7.0
Sun Solaris 8_x86
Sun Solaris 8_sparc
Sun Solaris 9
Sun Solaris 9_x86 Update 2
References
Sun Solaris libgss Unspecified Privilege Escalation Vulnerability
References:
References: