Your search did not match any results.
We suggest you try the following to help find what you’re looking for:
The Oracle Solaris Third Party Bulletin announces patches for one or more security vulnerabilities fixed in third party software that is included in Oracle Solaris distributions. Starting January 20, 2015, Third Party Bulletins are released on the same day when Oracle Critical Patch Updates are released. These bulletins will also be updated on the Tuesday closest to the 17th of the following two months after their release (i.e. the two months between the normal quarterly Critical Patch Update publication dates). In addition, Third Party Bulletins may also be updated for vulnerability fixes deemed too critical to wait for the next monthly update.
Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply Third Party Bulletin fixes as soon as possible.
Please see My Oracle Support Note 1448883.1
Third Party Bulletins are released on the Tuesday closest to the 17th day of January, April, July and October. The next four dates are:
2016-January-14 | Rev 5. Added OpenSSH CVE-2016-0777 and CVE-2016-0778 |
2015-December-15 | Rev 4. Added all CVEs fixed in Solaris 11.3SRU3.6 |
2015-November-16 | Rev 3. Added all CVEs fixed in Solaris 11.3SRU2.4 |
2015-October-26 | Rev 2. Added all CVEs fixed in Solaris 11.3 and 11.3SRU1.5 |
2015-October-20 | Rev 1. Initial Release |
This Third Party Bulletin contains 51 new security fixes for the Oracle Solaris. 41 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password.
CVE# | Product | Protocol | Third Party component | Remote Exploit without Auth.? | CVSS VERSION 2.0 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Access Vector | Access Complexity | Authentication | Confidentiality | Integrity | Availability | |||||||
CVE-2016-0778 | Solaris | SSH | OpenSSH | Yes | 5.1 | Network | High | None | Partial | Partial | Partial | 11.3 | |
CVE-2016-0777 | Solaris | SSH | OpenSSH | Yes | 4.3 | Network | Medium | None | Partial | None | None | 11.3 |
CVE# | Product | Protocol | Third Party component | Remote Exploit without Auth.? | CVSS VERSION 2.0 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Access Vector | Access Complexity | Authentication | Confidentiality | Integrity | Availability | |||||||
CVE-2015-8000 | Solaris | Bind | Bind/Postinstall script for Bind package | Yes | 7.1 | Network | Medium | None | None | None | Complete | 11.3, 10 | |
CVE-2015-4491 | Solaris | Multiple | gdk-pixbuf | Yes | 6.8 | Network | Medium | None | Partial | Partial | Partial | 11.3, 10 | |
CVE-2013-1438 | Solaris | Multiple | Dcraw | Yes | 4.3 | Network | Medium | None | None | None | Partial | 11.3 | |
CVE-2014-3566 | Solaris | SSL/TLS | Common Unix Printing System (CUPS) | Yes | 4.3 | Network | Medium | None | Partial | None | None | 11.3 | |
CVE-2015-7830 | Solaris | Multiple | Wireshark | Yes | 4.3 | Network | Medium | None | None | None | Partial | 11.3 |
CVE# | Product | Protocol | Third Party component | Remote Exploit without Auth.? | CVSS VERSION 2.0 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Access Vector | Access Complexity | Authentication | Confidentiality | Integrity | Availability | |||||||
CVE-2015-1270 | Solaris | None | Localization (L10N) | No | 1.5 | Local | Medium | Single | None | None | Partial | 11.3 | |
CVE-2015-4760 | Solaris | None | Localization (L10N) | No | 1.5 | Local | Medium | Single | None | None | Partial | 11.3 | |
CVE-2015-2632 | Solaris | None | Localization (L10N) | No | 1.0 | Local | High | Single | None | None | Partial | 11.3 |
CVE# | Product | Protocol | Third Party component | Remote Exploit without Auth.? | CVSS VERSION 2.0 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Access Vector | Access Complexity | Authentication | Confidentiality | Integrity | Availability | |||||||
CVE-2015-2731 | Solaris | Multiple | Firefox | Yes | 10.0 | Network | Low | None | Complete | Complete | Complete | 11.3 | See Note 13 |
CVE-2015-5600 | Solaris | SSH | OpenSSH | Yes | 8.5 | Network | Low | None | Partial | None | Complete | 11.3 | |
CVE-2014-6507 | Solaris | Multiple | MySQL | No | 8.0 | Network | Low | Single | Partial+ | Partial+ | Complete | 11.3 | See Note 4 |
CVE-2014-6507 | Solaris | Multiple | MySQL | No | 8.0 | Network | Low | Single | Partial+ | Partial+ | Complete | 11.3 | See Note 6 |
CVE-2014-3634 | Solaris | Multiple | RSYSLOG | Yes | 7.5 | Network | Low | None | Partial | Partial | Partial | 11.3 | See Note 2 |
CVE-2014-6052 | Solaris | Multiple | VNC | Yes | 7.5 | Network | Low | None | Partial | Partial | Partial | 11.3 | See Note 10 |
CVE-2015-0411 | Solaris | Multiple | MySQL | Yes | 7.5 | Network | Low | None | Partial | Partial | Partial | 11.3 | See Note 5 |
CVE-2014-3564 | Solaris | Multiple | GnuPG | Yes | 6.8 | Network | Medium | None | Partial | Partial | Partial | 11.3 | |
CVE-2014-8097 | Solaris | None | Xsun server | No | 6.8 | Local | Low | Single | Complete | Complete | Complete | 10 | See Note 8 |
CVE-2014-9512 | Solaris | Multiple | RSYNC | Yes | 6.4 | Network | Low | None | None | Partial | Partial | 11.3, 10 | |
CVE-2014-2653 | Solaris | SSH | OpenSSH | Yes | 5.8 | Network | Medium | None | None | Partial | Partial | 11.3 | |
CVE-2014-9365 | Solaris | Multiple | Python 3.4 | Yes | 5.8 | Network | Medium | None | Partial | Partial | None | 11.3 | |
CVE-2013-6371 | Solaris | Multiple | JSON-C | Yes | 5.0 | Network | Low | None | None | None | Partial | 11.3 | See Note 3 |
CVE-2014-3566 | Solaris | SSL/TLS | BitTorrent Client | Yes | 5.0 | Network | Low | None | Partial | None | None | 11.3 | |
CVE-2014-3566 | Solaris | SSL/TLS | Gnome-VFS | Yes | 5.0 | Network | Low | None | Partial | None | None | 11.3 | |
CVE-2014-3566 | Solaris | SSL/TLS | OpenSSL | Yes | 5.0 | Network | Low | None | Partial | None | None | 11.3, 10 | |
CVE-2014-3566 | Solaris | SSL/TLS | VNC | Yes | 5.0 | Network | Low | None | Partial | None | None | 11.3 | |
CVE-2014-3566 | Solaris | SSL/TLS | Pidgin | Yes | 5.0 | Network | Low | None | Partial | None | None | 11.3 | |
CVE-2014-3566 | Solaris | SSL/TLS | LibTLS | Yes | 5.0 | Network | Low | None | Partial | None | None | 11.3 | |
CVE-2014-3566 | Solaris | SSL/TLS | Ejabberd | Yes | 5.0 | Network | Low | None | Partial | None | None | 11.3 | |
CVE-2014-3566 | Solaris | SSL/TLS | Irssi | Yes | 5.0 | Network | Low | None | Partial | None | None | 11.3 | |
CVE-2014-3566 | Solaris | SSL/TLS | LibSoup | Yes | 5.0 | Network | Low | None | Partial | None | None | 11.3 | |
CVE-2015-0248 | Solaris | Multiple | Apache Subversion | Yes | 5.0 | Network | Low | None | None | None | Partial | 11.3 | |
CVE-2015-1819 | Solaris | Multiple | libxml2 | Yes | 5.0 | Network | Low | None | None | None | Partial | 11.3 | |
CVE-2015-3200 | Solaris | Multiple | Lighttpd | Yes | 5.0 | Network | Low | None | None | Partial | None | 11.3 | |
CVE-2015-4020 | Solaris | Multiple | Ruby | Yes | 5.0 | Network | Low | None | None | Partial | None | 11.3 | See Note 18 |
CVE-2015-5143 | Solaris | Multiple | Django Python web framework | Yes | 5.0 | Network | Low | None | None | None | Partial | 11.3 | |
CVE-2015-4651 | Solaris | Multiple | Wireshark | Yes | 5.0 | Network | Low | None | None | None | Partial | 11.3 | See Note 14 |
CVE-2015-3183 | Solaris | HTTP | Apache HTTP server | Yes | 5.0 | Network | Low | None | None | Partial | None | 11.3 | |
CVE-2015-0253 | Solaris | HTTP | Apache HTTP server | Yes | 5.0 | Network | Low | None | None | None | Partial | 11.3 | See Note 7 |
CVE-2015-5963 | Solaris | Multiple | Django Python web framework | Yes | 5.0 | Network | Low | None | None | None | Partial | 11.3 | See Note 16 |
CVE-2014-0032 | Solaris | Multiple | Apache Subversion | Yes | 4.3 | Network | Medium | None | None | None | Partial | 11.3 | See Note 1 |
CVE-2015-5144 | Solaris | Multiple | Django Python web framework | Yes | 4.3 | Network | Medium | None | None | Partial | None | 11.3 | |
CVE-2015-6241 | Solaris | Multiple | Wireshark | Yes | 4.3 | Network | Medium | None | None | None | Partial | 11.3 | See Note 17 |
CVE-2015-0251 | Solaris | Multiple | Apache Subversion | No | 4.0 | Network | Low | Single | None | Partial | None | 11.3 | |
CVE-2015-2922 | Solaris | Multiple | Network Configuration | No | 3.3 | Adjacent Network | Low | None | None | None | Partial | 11.3 | See Note 9 |
CVE-2013-1569 | Solaris | None | Localization (L10N) | No | 1.5 | Local | Medium | Single | None | None | Partial | 11.3 | See Note 11 |
CVE-2014-8146 | Solaris | None | Localization (L10N) | No | 1.0 | Local | High | Single | None | None | Partial | 11.3 | See Note 12 |
CVE# | Product | Protocol | Third Party component | Remote Exploit without Auth.? | CVSS VERSION 2.0 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Access Vector | Access Complexity | Authentication | Confidentiality | Integrity | Availability | |||||||
CVE-2015-5600 | Solaris | SSH | SSH | Yes | 8.5 | Network | Low | None | Partial | None | Complete | 11.2, 10 | |
CVE-2014-0230 | Solaris | HTTP | Apache Tomcat | Yes | 5.0 | Network | Low | None | None | None | Partial | 11.2, 10 | See Note 15 |
CVE-2014-8111 | Solaris | HTTP | Apache HTTP server | Yes | 5.0 | Network | Low | None | Partial | None | None | 11.2, 10 |