Sun SPARC Enterprise T5120 and T5220 Default Configuration Root Command Execution

critical Nessus Plugin ID 69420
New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.

VPR Score: 5.9

Synopsis

The remote Solaris host has a misconfigured SSH server.

Description

The remote Sun SPARC Enterprise Server has been mistakenly shipped with factory settings in the pre-installed Solaris 10 image which configures the remote SSH server insecurely. As a result, local or remote users may leverage these misconfigurations to execute arbitrary commands with the privileges of the root (uid 0) user.

Solution

Follow the steps in the workaround section of the advisory above

See Also

https://download.oracle.com/sunalerts/1018965.1.html

Plugin Details

Severity: Critical

ID: 69420

File Name: sun_sparc_ssh_bad_config.nasl

Version: 1.16

Type: remote

Agent: unix

Published: 8/21/2013

Updated: 8/5/2020

Dependencies: ssh_get_info.nasl

Risk Information

Risk Factor: Critical

VPR Score: 5.9

CVSS Score Source: CVE-2008-1369

CVSS v2.0

Base Score: 10

Temporal Score: 7.4

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:sun:solaris

Required KB Items: Host/uname

Exploit Ease: No known exploits are available

Patch Publication Date: 3/18/2008

Vulnerability Publication Date: 3/18/2008

Reference Information

CVE: CVE-2008-1369

IAVA: 2008-A-0025-S

CWE: 264