Filtered by vendor Sun Subscriptions
Filtered by product Sunos Subscriptions
Total 609 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2003-1055 1 Sun 2 Solaris, Sunos 2025-04-03 N/A
Buffer overflow in the nss_ldap.so.1 library for Sun Solaris 8 and 9 may allow local users to gain root access via a long hostname in an LDAP lookup.
CVE-2003-1056 1 Sun 2 Solaris, Sunos 2025-04-03 N/A
The ed editor for Sun Solaris 2.6, 7, and 8 allows local users to create or overwrite arbitrary files via a symlink attack on temporary files.
CVE-2003-1057 1 Sun 2 Solaris, Sunos 2025-04-03 N/A
Unknown vulnerability in CDE Print Viewer (dtprintinfo) for Sun Solaris 2.6 through 9 may allow local users to execute arbitrary code.
CVE-2003-1058 1 Sun 2 Solaris, Sunos 2025-04-03 N/A
The Xsun server for Sun Solaris 2.6 through 9, when running in Direct Graphics Access (DGA) mode, allows local users to cause a denial of service (Xsun crash) or to create or overwrite arbitrary files on the system, probably via a symlink attack on temporary server files.
CVE-2003-1059 1 Sun 2 Solaris, Sunos 2025-04-03 N/A
Unknown vulnerability in the libraries for the PGX32 frame buffer in Solaris 2.5.1 and 2.6 through 9 allows local users to gain root access.
CVE-2003-1062 1 Sun 2 Solaris, Sunos 2025-04-03 N/A
Unknown vulnerability in the sysinfo system call for Solaris for SPARC 2.6 through 9, and Solaris for x86 2.6, 7, and 8, allows local users to read kernel memory.
CVE-2003-1066 1 Sun 2 Solaris, Sunos 2025-04-03 N/A
Buffer overflow in the syslog daemon for Solaris 2.6 through 9 allows remote attackers to cause a denial of service (syslogd crash) and possibly execute arbitrary code via long syslog UDP packets.
CVE-2003-1068 1 Sun 2 Solaris, Sunos 2025-04-03 N/A
Buffer overflow in utmp_update for Solaris 2.6 through 9 allows local users to gain root privileges, as identified by Sun BugID 4659277, a different vulnerability than CVE-2003-1082.
CVE-2003-1071 1 Sun 2 Solaris, Sunos 2025-04-03 N/A
rpc.walld (wall daemon) for Solaris 2.6 through 9 allows local users to send messages to logged on users that appear to come from arbitrary user IDs by closing stderr before executing wall, then supplying a spoofed from header.