4.4
CVSSv2

CVE-2020-2851

Published: 15/04/2020 Updated: 30/06/2022
CVSS v2 Base Score: 4.4 | Impact Score: 6.4 | Exploitability Score: 3.4
CVSS v3 Base Score: 7.8 | Impact Score: 6 | Exploitability Score: 1.1
VMScore: 393
Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Vulnerability in the Oracle Solaris product of Oracle Systems (component: Common Desktop Environment). Supported versions that are affected are 10 and 11. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Solaris. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

oracle solaris 11

oracle solaris 10

Exploits

A difficult to exploit stack-based buffer overflow in the _DtCreateDtDirs() function in the Common Desktop Environment version distributed with Oracle Solaris 10 1/13 (Update 11) and earlier may allow local users to corrupt memory and potentially execute arbitrary code in order to escalate privileges via a long X11 display name The vulnerable func ...

Github Repositories

static-analyzer-c-rules Porting some rules from semgrep name ---- insecure-use-gets-fn description ----------- Avoid 'gets()' This function does not consider buffer boundaries and can lead to buffer overflows Use 'fgets()' or 'gets_s()' instead cwe --- 'CWE-676: Use of Potentially Dangerous Function' references ---------- https:/

static-analyzer-c-rules Porting some rules from semgrep name ---- insecure-use-gets-fn description ----------- Avoid 'gets()' This function does not consider buffer boundaries and can lead to buffer overflows Use 'fgets()' or 'gets_s()' instead cwe --- 'CWE-676: Use of Potentially Dangerous Function' references ---------- https:/