4.6 Medium
CVSS2
Access Vector
Access Complexity
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
25.3%
Vulnerability in the Solaris component of Oracle and Sun Systems Products Suite (subcomponent: Print Filter Utility). Supported versions that are affected are 9, 10 and 11.1. Easily exploitable vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized update, insert or delete access to some Solaris accessible data as well as read access to a subset of Solaris accessible data and ability to cause a partial denial of service (partial DOS) of Solaris.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text in this plugin was
# extracted from the Oracle SunOS Patch Updates.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(73594);
script_version("1.6");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/14");
script_cve_id("CVE-2014-0442");
script_bugtraq_id(66837);
script_name(english:"Solaris 9 (x86) : 149074-01");
script_summary(english:"Check for patch 149074-01");
script_set_attribute(
attribute:"synopsis",
value:"The remote host is missing Sun Security Patch number 149074-01"
);
script_set_attribute(
attribute:"description",
value:
"Vulnerability in the Solaris component of Oracle and Sun Systems
Products Suite (subcomponent: Print Filter Utility). Supported
versions that are affected are 9, 10 and 11.1. Easily exploitable
vulnerability requiring logon to Operating System. Successful attack
of this vulnerability can result in unauthorized update, insert or
delete access to some Solaris accessible data as well as read access
to a subset of Solaris accessible data and ability to cause a partial
denial of service (partial DOS) of Solaris."
);
script_set_attribute(
attribute:"see_also",
value:"https://getupdates.oracle.com/readme/149074-01"
);
script_set_attribute(
attribute:"solution",
value:"You should install this patch for your system to be up-to-date."
);
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:sun:solaris");
script_set_attribute(attribute:"patch_publication_date", value:"2014/03/10");
script_set_attribute(attribute:"plugin_publication_date", value:"2014/04/17");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2014-2021 Tenable Network Security, Inc.");
script_family(english:"Solaris Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/Solaris/showrev");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("solaris.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (solaris_check_patch(release:"5.9_x86", arch:"i386", patch:"149074-01", obsoleted_by:"", package:"SUNWpsutilsS", version:"11.9.0,REV=2004.04.26.13.09") < 0) flag++;
if (solaris_check_patch(release:"5.9_x86", arch:"i386", patch:"149074-01", obsoleted_by:"", package:"SUNWpsutils", version:"11.9.0,REV=2004.04.26.13.09") < 0) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:solaris_get_report());
else security_warning(0);
exit(0);
}
audit(AUDIT_HOST_NOT, "affected");