2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2013-3838" ,
"sourceIdentifier" : "secalert_us@oracle.com" ,
"published" : "2013-10-16T15:55:33.990" ,
2024-11-22 19:15:24 +00:00
"lastModified" : "2024-11-21T01:54:23.833" ,
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Unspecified vulnerability in Oracle SPARC Enterprise T & M Series Servers running Sun System Firmware before 6.7.13 for SPARC T1, 7.4.6.c for SPARC T2, 8.3.0.b for SPARC T3 & T4, 9.0.0.d for SPARC T5 and 9.0.1.e for SPARC M5 allows local users to affect availability via unknown vectors related to Sun System Firmware/Hypervisor."
} ,
{
"lang" : "es" ,
"value" : "Vulnerabilidad no especificada en Oracle SPARC Enterprise T & Servers Serie M con Sun System Firmware 6.7.13 anterior a SPARC T1, 7.4.6.c para SPARC T2, 8.3.0.b para SPARC T3 y T4, 9.0.0.d para SPARC T5 y 9.0.1.e para SPARC M5 permite a usuarios locales afectar a la disponibilidad a trav\u00e9s de vectores desconocidos relacionados con Sun System Firmware/Hypervisor."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:L/AC:H/Au:N/C:N/I:N/A:C" ,
2024-11-22 19:15:24 +00:00
"baseScore" : 4.0 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "LOCAL" ,
"accessComplexity" : "HIGH" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-11-22 19:15:24 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 1.9 ,
"impactScore" : 6.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-noinfo"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:oracle:sun_system_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "6.7.12" ,
"matchCriteriaId" : "AFC9F1F7-FEF5-4414-84A3-3E1F2A8F4A18"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:oracle:sun_system_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "7.4.6" ,
"matchCriteriaId" : "064CEF82-1B1F-4618-85B8-4C2539DD6D53"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:oracle:sun_system_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "8.3.0" ,
"matchCriteriaId" : "2C1717F2-CB0C-43CA-BE77-C1ECA99C1D63"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:oracle:sun_system_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "9.0.0" ,
"matchCriteriaId" : "F13B7C58-632E-4E03-A975-1360C34C1924"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:oracle:sun_system_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "9.0.1" ,
"matchCriteriaId" : "AB3FF26C-F1C8-4A5F-99A8-6EEB3C266F15"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:oracle:sparc_enterprise_m8000_server:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3F528DC3-ADBB-4612-A8C0-A4B806E5BB44"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:oracle:sparc_enterprise_m9000_server:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E0050034-1E95-4724-B359-87C56D0198C4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:oracle:sparc_t3-1:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "92144B15-6A30-4451-9CB8-3E94E2550F4D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:oracle:sparc_t3-1b:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EF19DEF8-E1BC-48BD-9852-071F57D31B07"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:oracle:sparc_t3-2:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E21A92F3-00AF-4650-8219-812C71EE3B2C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:oracle:sparc_t3-3:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0290C800-9FFE-44C9-BA63-3CCEB56250B7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:oracle:sparc_t3-4:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E4164246-50E7-46E5-BCB9-1CE4913361E4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:oracle:sparc_t4-1:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D0058692-28E1-4948-AF49-DE8D20CCB5DB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:oracle:sparc_t4-1b:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6BD7449E-0FF8-42ED-AB4B-D3BEE7B07E31"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:oracle:sparc_t4-2:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DD9F7D61-E06B-4F1D-9145-4B59868DFED4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:oracle:sparc_t4-4:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5F61C1C4-90D0-4D88-8282-741475C6A9DB"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html" ,
"source" : "secalert_us@oracle.com" ,
"tags" : [
"Vendor Advisory"
]
2024-11-22 19:15:24 +00:00
} ,
{
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
2024-11-22 19:15:24 +00:00
] ,
"evaluatorComment" : "Per: http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html\n\n\"CVE-2013-3838 applies to Sun System Firmware before 6.7.13 for SPARC T1, 7.4.6.c for SPARC T2, 8.3.0.b for SPARC T3 & T4, 9.0.0.d for SPARC T5 and 9.0.1.e for SPARC M5.\"+"
2023-04-24 12:24:31 +02:00
}