Show plain JSON{"id": "CVE-2010-4435", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 10.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2011-01-19T17:00:02.123", "references": [{"url": "http://aix.software.ibm.com/aix/efixes/security/cmsd_advisory.asc", "source": "secalert_us@oracle.com"}, {"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02702395", "source": "secalert_us@oracle.com"}, {"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02702395", "source": "secalert_us@oracle.com"}, {"url": "http://osvdb.org/70569", "source": "secalert_us@oracle.com"}, {"url": "http://secunia.com/advisories/42984", "tags": ["Vendor Advisory"], "source": "secalert_us@oracle.com"}, {"url": "http://secunia.com/advisories/43258", "tags": ["Vendor Advisory"], "source": "secalert_us@oracle.com"}, {"url": "http://securityreason.com/securityalert/8069", "source": "secalert_us@oracle.com"}, {"url": "http://www.exploit-db.com/exploits/16137", "tags": ["Exploit"], "source": "secalert_us@oracle.com"}, {"url": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html", "tags": ["Vendor Advisory"], "source": "secalert_us@oracle.com"}, {"url": "http://www.securityfocus.com/archive/1/516284/100/0/threaded", "source": "secalert_us@oracle.com"}, {"url": "http://www.securityfocus.com/archive/1/516304/100/0/threaded", "source": "secalert_us@oracle.com"}, {"url": "http://www.securityfocus.com/bid/45853", "source": "secalert_us@oracle.com"}, {"url": "http://www.securityfocus.com/bid/46261", "source": "secalert_us@oracle.com"}, {"url": "http://www.securitytracker.com/id?1024975", "source": "secalert_us@oracle.com"}, {"url": "http://www.vupen.com/english/advisories/2011/0151", "tags": ["Vendor Advisory"], "source": "secalert_us@oracle.com"}, {"url": "http://www.vupen.com/english/advisories/2011/0352", "tags": ["Vendor Advisory"], "source": "secalert_us@oracle.com"}, {"url": "http://www.zerodayinitiative.com/advisories/ZDI-11-062/", "source": "secalert_us@oracle.com"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64797", "source": "secalert_us@oracle.com"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12794", "source": "secalert_us@oracle.com"}, {"url": "http://aix.software.ibm.com/aix/efixes/security/cmsd_advisory.asc", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02702395", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02702395", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://osvdb.org/70569", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/42984", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/43258", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://securityreason.com/securityalert/8069", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.exploit-db.com/exploits/16137", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/516284/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/516304/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/45853", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/46261", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securitytracker.com/id?1024975", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2011/0151", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2011/0352", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.zerodayinitiative.com/advisories/ZDI-11-062/", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64797", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12794", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "descriptions": [{"lang": "en", "value": "Unspecified vulnerability in Oracle Solaris 8, 9, and 10 allows remote attackers to affect confidentiality, integrity, and availability, related to CDE Calendar Manager Service Daemon and RPC. NOTE: the previous information was obtained from the January 2011 CPU. Oracle has not commented on claims from other software vendors that this affects other operating systems, such as HP-UX, or claims from a reliable third party that this is a buffer overflow in rpc.cmsd via long XDR-encoded ASCII strings in RPC call 10."}, {"lang": "es", "value": "Una vulnerabilidad no especificada en Solaris de Oracle versiones 8, 9 y 10, permite a los atacantes remotos afectar la confidencialidad, integridad y disponibilidad, relacionadas con CDE Calendar Manager Service Daemon and RPC. NOTA: la informaci\u00f3n anterior fue obtenida de la CPU de enero de 2011. Oracle no ha comentado sobre las afirmaciones de otros proveedores de software que esto afecta a otros sistemas operativos, como HP-UX, o las afirmaciones de un tercero confiable de que se trata de un desbordamiento de b\u00fafer en el archivo rpc.cmsd por medio de cadenas ASCII largas codificadas en XDR en la llamada RPC 10."}], "lastModified": "2024-11-21T01:20:56.620", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A2475113-CFE4-41C8-A86F-F2DA6548D224"}, {"criteria": "cpe:2.3:o:sun:sunos:5.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A1E585DC-FC74-4BB0-96B7-C00B6DB610DF"}, {"criteria": "cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E75493D0-F060-4CBA-8AB0-C4FE8B2A8C9B"}], "operator": "OR"}]}], "sourceIdentifier": "secalert_us@oracle.com"}