7.2
CVSSv2

CVE-2018-2892

Published: 18/07/2018 Updated: 03/10/2019
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 725
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Availability Suite Service). Supported versions that are affected are 10 and 11.3. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks of this vulnerability can result in takeover of Solaris. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

oracle solaris 10.0

oracle solaris 11.3

Exploits

/* # Exploit Title: Solaris/OpenSolaris AVS kernel code execution # Google Dork: [if applicable] # Date: 24/7/2018 # Exploit Author: mu-b # Vendor Homepage: oraclecom # Software Link: # Version: Solaris 10, Solaris <= 113 # Tested on: Solaris 11X, OpenSolaris # CVE : CVE-2018-2892 digit-labsorg/files/exploits/sdbc-testinitc d ...
Sun Solaris versions 10 and 113 and below local kernel root exploit ...

Recent Articles

Dust yourself off and try again: Ancient Solaris patch missed the mark
The Register • John Leyden • 24 Jul 2018

Privilege escalation bug was still sitting there 11 years later So long and thanks for all the fixes: ERPScan left out of credits on Oracle bug-bash list

A vulnerability first detected and "resolved" years ago in Oracle's Unix OS, Solaris, has resurfaced, necessitating a fix in Big Red's latest quarterly patch batch. Rather than a Lazarus-like return from the dead, it's more a case of security researchers discovering that the original fix, for a component that's become known as Solaris Availability Suite Service, isn't good enough. Oracle agreed with security researchers at Trustwave, who flagged up the issue, and pushed out a new fix. The (CVE-2...