TCP: Oracle Solaris RPC CVE-2017-3623 Heap Buffer Overflow

This signature detects attempts to exploit a known vulnerability in the Oracle Solaris RPC. Successful exploitation could lead to the arbitrary code execution.

Extended Description

Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel RPC). For supported versions that are affected see note. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Solaris. While the vulnerability is in Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Solaris. Note: CVE-2017-3623 is assigned for "Ebbisland". Solaris 10 systems which have had any Kernel patch installed after, or updated via patching tools since 2012-01-26 are not impacted. Also, any Solaris 10 system installed with Solaris 10 1/13 (Solaris 10 Update 11) are not vulnerable. Solaris 11 is not impacted by this issue. CVSS 3.0 Base Score 10.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).

Affected Products

Oracle solaris

References

CVE: CVE-2017-3623

Short Name
TCP:C2S:RPC-ORACLE-SOLARIS-HBO
Severity
Major
Recommended
False
Recommended Action
Drop
Category
TCP
Keywords
Buffer CVE-2017-3623 Heap Oracle Overflow RPC Solaris
Release Date
10/28/2021
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3431
Port
TCP/32768-65535
False Positive
Unknown
Vendors

Oracle

CVSS Score

10.0

Found a potential security threat?