Vulnerability Details : CVE-2008-2710
Potential exploit
Integer signedness error in the ip_set_srcfilter function in the IP Multicast Filter in uts/common/inet/ip/ip_multi.c in the kernel in Sun Solaris 10 and OpenSolaris before snv_92 allows local users to execute arbitrary code in other Solaris Zones via an SIOCSIPMSFILTER IOCTL request with a large value of the imsf->imsf_numsrc field, which triggers an out-of-bounds write of kernel memory. NOTE: this was reported as an integer overflow, but the root cause involves the bypass of a signed comparison.
Vulnerability category: OverflowExecute code
Products affected by CVE-2008-2710
- cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*
- cpe:2.3:o:sun:solaris:*:*:sparc:*:*:*:*:*
- cpe:2.3:o:sun:opensolaris:10:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-2710
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 11 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-2710
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST |
CWE ids for CVE-2008-2710
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-2710
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-237965-1
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/43068
-
http://www.securityfocus.com/bid/29699
-
http://www.securitytracker.com/id?1020283
-
http://www.vupen.com/english/advisories/2008/1832/references
-
http://www.trapkit.de/advisories/TKADV2008-003.txt
Exploit
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5731
Jump to