header-logo
Suggest Exploit
vendor:
Solaris
by:
SecurityFocus
7.5
CVSS
HIGH
Solaris TCP/IP Stack
N/A
CWE
Product Name: Solaris
Affected Version From: Solaris 2.6
Affected Version To: Solaris 8
Patch Exists: N/A
Related CWE: N/A
CPE: o:sun:solaris
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Solaris
2001

Solaris TCP/IP Stack

A vulnerability in Solaris TCP/IP stack may allow remote users to panic the system. If the nmap network mapping utility is used with the OS fingerprinting option ('-O') against an active listening port and the server listening on that port is then killed the system will panic because of recursive calls to mutex_enter within the TCP streams driver.

Mitigation:

N/A
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/655/info

A vulnerability in Solaris TCP/IP stack may allow remote users to panic the system.

If the nmap network mapping utility is used with the OS fingerprinting option ('-O') against an active listening port and the server listening on that port is then killed the system will panic because of recursive calls to mutex_enter within the TCP streams driver.

$nmap -O -p 80 targethost.com