Vulnerability Description
The labeled networking implementation in Solaris Trusted Extensions in Sun Solaris 10 and OpenSolaris snv_39 through snv_67, when a labeled zone is in the installed state, allows remote authenticated users to bypass a Mandatory Access Control (MAC) policy and obtain access to the global zone.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sun | Opensolaris | build_snv_39 |
| Sun | Sunos | 5.10 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/31412Vendor Advisory
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-240099-1
- http://www.securityfocus.com/bid/30602
- http://secunia.com/advisories/31412Vendor Advisory
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-240099-1
- http://www.securityfocus.com/bid/30602
FAQ
What is CVE-2008-7300?
CVE-2008-7300 is a vulnerability with a CVSS score of 8.5 (HIGH). The labeled networking implementation in Solaris Trusted Extensions in Sun Solaris 10 and OpenSolaris snv_39 through snv_67, when a labeled zone is in the installed state, allows remote authenticated ...
How severe is CVE-2008-7300?
CVE-2008-7300 has been rated HIGH with a CVSS base score of 8.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-7300?
Check the references section above for vendor advisories and patch information. Affected products include: Sun Opensolaris, Sun Sunos.