Vulnerability in the Oracle Solaris product of Oracle Systems (component: Utility). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Solaris, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Solaris. CVSS 3.1 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H).
History

Mon, 16 Sep 2024 16:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284

cve-icon MITRE

Status: PUBLISHED

Assigner: oracle

Published: 2023-04-18T19:54:40.659Z

Updated: 2024-09-16T14:24:39.285Z

Reserved: 2022-12-17T19:26:00.739Z

Link: CVE-2023-21985

cve-icon Vulnrichment

Updated: 2024-08-02T09:59:28.549Z

cve-icon NVD

Status : Modified

Published: 2023-04-18T20:15:17.517

Modified: 2024-09-16T15:35:07.530

Link: CVE-2023-21985

cve-icon Redhat

No data.