CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:S/C:C/I:C/A:C
EPSS
Percentile
25.5%
This Solaris system is missing necessary patches to address critical security updates :
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Solaris Kernel Zones). The supported version that is affected is 11.2.
Easily exploitable vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized read access to a subset of Solaris accessible data. (CVE-2015-4801)
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel Zones virtualized NIC driver). The supported version that is affected is 11.2. Very difficult to exploit vulnerability requiring logon to Operating System.
Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution. (CVE-2015-4817)
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Solaris Kernel Zones). The supported version that is affected is 11.2.
Very difficult to exploit vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.
(CVE-2015-4820)
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Solaris Kernel Zones). The supported version that is affected is 11.2.
Very difficult to exploit vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Solaris. (CVE-2015-4822)
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Solaris Kernel Zones). The supported version that is affected is 11.2.
Easily exploitable vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized Operating System hang or frequently repeatable crash (complete DOS). (CVE-2015-4831)
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Utility/Security).
The supported version that is affected is 11.2.
Difficult to exploit vulnerability requiring logon to Operating System plus additional login/authentication to component or subcomponent. Successful attack of this vulnerability can escalate attacker privileges resulting in unauthorized Operating System takeover including arbitrary code execution. (CVE-2015-4837)
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Solaris Kernel Zones). The supported version that is affected is 11.2.
Easily exploitable vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Solaris as well as update, insert or delete access to some Solaris accessible data and read access to a subset of Solaris accessible data. (CVE-2015-4907)
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from the Oracle CPU for oct2015.
#
include('deprecated_nasl_level.inc');
include("compat.inc");
if (description)
{
script_id(86532);
script_version("2.13");
script_set_attribute(attribute:"plugin_modification_date", value:"2022/08/11");
script_cve_id("CVE-2015-4801", "CVE-2015-4817", "CVE-2015-4820", "CVE-2015-4822", "CVE-2015-4831", "CVE-2015-4837", "CVE-2015-4907");
script_name(english:"Oracle Solaris Critical Patch Update : oct2015_SRU11_2_13_6_0");
script_summary(english:"Check for the oct2015 CPU");
script_set_attribute(
attribute:"synopsis",
value:
"The remote Solaris system is missing a security patch from CPU
oct2015."
);
script_set_attribute(
attribute:"description",
value:
"This Solaris system is missing necessary patches to address critical
security updates :
- Vulnerability in the Solaris component of Oracle Sun
Systems Products Suite (subcomponent: Solaris Kernel
Zones). The supported version that is affected is 11.2.
Easily exploitable vulnerability requiring logon to
Operating System. Successful attack of this
vulnerability can result in unauthorized read access to
a subset of Solaris accessible data. (CVE-2015-4801)
- Vulnerability in the Solaris component of Oracle Sun
Systems Products Suite (subcomponent: Kernel Zones
virtualized NIC driver). The supported version that is
affected is 11.2. Very difficult to exploit
vulnerability requiring logon to Operating System.
Successful attack of this vulnerability can result in
unauthorized Operating System takeover including
arbitrary code execution. (CVE-2015-4817)
- Vulnerability in the Solaris component of Oracle Sun
Systems Products Suite (subcomponent: Solaris Kernel
Zones). The supported version that is affected is 11.2.
Very difficult to exploit vulnerability requiring logon
to Operating System. Successful attack of this
vulnerability can result in unauthorized Operating
System takeover including arbitrary code execution.
(CVE-2015-4820)
- Vulnerability in the Solaris component of Oracle Sun
Systems Products Suite (subcomponent: Solaris Kernel
Zones). The supported version that is affected is 11.2.
Very difficult to exploit vulnerability requiring logon
to Operating System. Successful attack of this
vulnerability can result in unauthorized ability to
cause a partial denial of service (partial DOS) of
Solaris. (CVE-2015-4822)
- Vulnerability in the Solaris component of Oracle Sun
Systems Products Suite (subcomponent: Solaris Kernel
Zones). The supported version that is affected is 11.2.
Easily exploitable vulnerability requiring logon to
Operating System. Successful attack of this
vulnerability can result in unauthorized Operating
System hang or frequently repeatable crash (complete
DOS). (CVE-2015-4831)
- Vulnerability in the Solaris component of Oracle Sun
Systems Products Suite (subcomponent: Utility/Security).
The supported version that is affected is 11.2.
Difficult to exploit vulnerability requiring logon to
Operating System plus additional login/authentication to
component or subcomponent. Successful attack of this
vulnerability can escalate attacker privileges resulting
in unauthorized Operating System takeover including
arbitrary code execution. (CVE-2015-4837)
- Vulnerability in the Solaris component of Oracle Sun
Systems Products Suite (subcomponent: Solaris Kernel
Zones). The supported version that is affected is 11.2.
Easily exploitable vulnerability requiring logon to
Operating System. Successful attack of this
vulnerability can result in unauthorized ability to
cause a hang or frequently repeatable crash (complete
DOS) of Solaris as well as update, insert or delete
access to some Solaris accessible data and read access
to a subset of Solaris accessible data. (CVE-2015-4907)"
);
script_set_attribute(
attribute:"see_also",
value:"https://support.oracle.com/epmos/faces/DocumentDisplay?id=2060027.1"
);
# https://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/2368795.xml
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?1de82df5"
);
script_set_attribute(
attribute:"solution",
value:"Install the oct2015 CPU from the Oracle support website."
);
script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:S/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:solaris:11.2");
script_set_attribute(attribute:"vuln_publication_date", value:"2015/10/21");
script_set_attribute(attribute:"patch_publication_date", value:"2015/10/27");
script_set_attribute(attribute:"plugin_publication_date", value:"2015/10/22");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2015-2022 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Solaris Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/Solaris11/release");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("solaris.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/Solaris11/release");
if (isnull(release)) audit(AUDIT_OS_NOT, "Solaris11");
fix_release = "0.5.11-0.175.2.13.0.6.0";
flag = 0;
if (solaris_check_release(release:"0.5.11-0.175.2.13.0.6.0", sru:"S11.2.13.6.0") > 0) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:solaris_get_report2());
else security_warning(0);
exit(0);
}
audit(AUDIT_OS_RELEASE_NOT, "Solaris", fix_release, release);
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4801
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4817
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4820
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4822
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4831
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4837
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4907
www.nessus.org/u?1de82df5
support.oracle.com/epmos/faces/DocumentDisplay?id=2060027.1