VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
VRDA-090930-001
Security Vulnerabilities in Solaris Trusted Extensions Common Desktop Environment (CDE) may allow Privilege Escalation or Mandatory Access Control (MAC) Policy Violation
http://sunsolve.sun.com/search/document.do?assetkey=1-66-267488-1

Security Vulnerabilities in Solaris Trusted Extensions Common Desktop Environment (CDE) may allow an unprivileged local user to easily execute arbitrary commands with root privileges or to bypass Mandatory Access Control (MAC) policy.




About This Analysis Information
Analysis Information Provider:
JPCERT/CC
First Published:
2009-09-30
Source Information Category:
Advisory, Alert
Last Updated:
2009-09-30




Affected Product Tags
cpe:/o:sun:solaris:10     (Sun Solaris 10)
 


Vulnerability Analysis Results
[Information Source Reliability] [?]
Low [?]

Medium [?]
X High [?]

[Impact Level] [?]
Low [?]

Low-Medium [?]
Medium-High [?]
X High [?]

[Access Required] [?]
Physical [?]

X Local [?]
Non-routed [?]
Routed [?]

[Authentication] [?]
Privileged [?]

X Standard [?]
Limited [?]
None or Unnecessary [?]

[User Interaction Required] [?]
Complex [?]

X Simple [?]
None [?]

[Technical Difficulty] [?]
High [?]

Medium-High [?]
Low-Medium [?]
Low [?]

[Availability of Remediation] [?]
X Official Patch [?]

Official Workaround [?]
Unofficial Patch [?]
None [?]

[Incident Activity] [?]
X None [?]

Exploit or PoC [?]
Activity Observed [?]

Alternatives




References

Copyright © 2009 JPCERT/CC All Rights Reserved.