This script is Copyright (C) 2015 Tenable Network Security, Inc.
The remote Solaris system is missing a security patch for third-party
The remote Solaris system is missing necessary patches to address
security updates :
- The SSL protocol, as used in certain configurations in
Microsoft Windows and Microsoft Internet Explorer,
Mozilla Firefox, Google Chrome, Opera, and other
products, encrypts data by using CBC mode with chained
initialization vectors, which allows man-in-the-middle
attackers to obtain plaintext HTTP headers via a
blockwise chosen-boundary attack (BCBA) on an HTTPS
(1) the HTML5 WebSocket API, (2) the Java URLConnection
API, or (3) the Silverlight WebClient API, aka a 'BEAST'
- Fetchmail 5.0.8 through 6.3.21, when using NTLM
authentication in debug mode, allows remote NTLM servers
to (1) cause a denial of service (crash and delayed
delivery of inbound mail) via a crafted NTLM response
that triggers an out-of-bounds read in the base64
decoder, or (2) obtain sensitive information from memory
via an NTLM Type 2 message with a crafted Target Name
structure, which triggers an out-of-bounds read.
See also :
Upgrade to Solaris 11/11 SRU 12.4.
Risk factor :
Medium / CVSS Base Score : 5.8