SB20230418171 - Multiple vulnerabilities in Oracle Solaris
Published: April 18, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Improper input validation (CVE-ID: CVE-2023-21928)
The vulnerability allows a local privileged user to manipulate data.
The vulnerability exists due to improper input validation within the IPS repository daemon component in Oracle Solaris. A local privileged user can exploit this vulnerability to manipulate data.
2) Improper input validation (CVE-ID: CVE-2023-22003)
The vulnerability allows a local non-authenticated attacker to manipulate data.
The vulnerability exists due to improper input validation within the Utility component in Oracle Solaris. A local non-authenticated attacker can exploit this vulnerability to manipulate data.
3) Improper input validation (CVE-ID: CVE-2023-21984)
The vulnerability allows a remote authenticated user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the Libraries component in Oracle Solaris. A remote authenticated user can exploit this vulnerability to perform a denial of service (DoS) attack.
4) Improper input validation (CVE-ID: CVE-2023-21896)
The vulnerability allows a local authenticated user to execute arbitrary code.
The vulnerability exists due to improper input validation within the NSSwitch component in Oracle Solaris. A local authenticated user can exploit this vulnerability to execute arbitrary code.
5) Improper input validation (CVE-ID: CVE-2023-21985)
The vulnerability allows a local privileged user to execute arbitrary code.
The vulnerability exists due to improper input validation within the Utility component in Oracle Solaris. A local privileged user can exploit this vulnerability to execute arbitrary code.
6) Improper input validation (CVE-ID: CVE-2023-21948)
The vulnerability allows a local authenticated user to execute arbitrary code.
The vulnerability exists due to improper input validation within the Core component in Oracle Solaris. A local authenticated user can exploit this vulnerability to execute arbitrary code.
Remediation
Install update from vendor's website.