var-201207-0147
Vulnerability from variot
Unspecified vulnerability in Oracle SPARC T-Series Servers running System Firmware 8.2.0 and 8.1.4.e or earlier allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Integrated Lights Out Manager. (DoS) An attack may be carried out. Oracle Sun Products Suite is prone to a local vulnerability in SPARC T-Series Servers. The 'Integrated Lights Out Manager' sub component is affected. This vulnerability affects the following supported versions: System Firmware 8.1.4.e or earlier, System Firmware 8.2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201207-0147", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sparc t-series server", "scope": "eq", "trust": 1.6, "vendor": "oracle", "version": "8.2.0" }, { "model": "netra sparc t3-1", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": null }, { "model": "sparc t3-1b", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": null }, { "model": "sparc t3-2", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": null }, { "model": "netra sparc t4-1", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": null }, { "model": "sparc t3-1", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": null }, { "model": "sparc t4-1b", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": null }, { "model": "netra sparc t4-1b", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": null }, { "model": "netra sparc t3-1b", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": null }, { "model": "sparc t-series server", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "8.1.4e" }, { "model": "sparc t3-4", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": null }, { "model": "sparc t4-4", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": null }, { "model": "sparc t4-2", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": null }, { "model": "sparc t4-1", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": null }, { "model": "netra sparc t4-2", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": null }, { "model": "netra sparc t3-1", "scope": null, "trust": 0.8, "vendor": "oracle", "version": null }, { "model": "netra sparc t3-1b", "scope": null, "trust": 0.8, "vendor": "oracle", "version": null }, { "model": "netra sparc t4-1", "scope": null, "trust": 0.8, "vendor": "oracle", "version": null }, { "model": "netra sparc t4-1b", "scope": null, "trust": 0.8, "vendor": "oracle", "version": null }, { "model": "netra sparc t4-2", "scope": null, "trust": 0.8, "vendor": "oracle", "version": null }, { "model": "sparc t series server", "scope": "lte", "trust": 0.8, "vendor": "oracle", "version": "8.1.4.e" }, { "model": "sparc t series server", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "8.2.0" }, { "model": "sparc t3-1", "scope": null, "trust": 0.8, "vendor": "oracle", "version": null }, { "model": "sparc t3-1b", "scope": null, "trust": 0.8, "vendor": "oracle", "version": null }, { "model": "sparc t3-2", "scope": null, "trust": 0.8, "vendor": "oracle", "version": null }, { "model": "sparc t3-4", "scope": null, "trust": 0.8, "vendor": "oracle", "version": null }, { "model": "sparc t4-1", "scope": null, "trust": 0.8, "vendor": "oracle", "version": null }, { "model": "sparc t4-1b", "scope": null, "trust": 0.8, "vendor": "oracle", "version": null }, { "model": "sparc t4-2", "scope": null, "trust": 0.8, "vendor": "oracle", "version": null }, { "model": "sparc t4-4", "scope": null, "trust": 0.8, "vendor": "oracle", "version": null }, { "model": "sparc t-series server", "scope": "eq", "trust": 0.6, "vendor": "oracle", "version": "8.1.4e" }, { "model": "sparc t3-4", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "0" }, { "model": "sparc t3-2", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "0" }, { "model": "sparc t3-1b", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "0" }, { "model": "sparc t3-1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "0" }, { "model": "netra sparc t3-1b", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "0" }, { "model": "netra sparc t3-1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "0" } ], "sources": [ { "db": "BID", "id": "54564" }, { "db": "JVNDB", "id": "JVNDB-2012-003203" }, { "db": "CNNVD", "id": "CNNVD-201207-336" }, { "db": "NVD", "id": "CVE-2012-3128" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:oracle:netra_sparc_t3-1", "vulnerable": true }, { "cpe22Uri": "cpe:/h:oracle:netra_sparc_t3-1b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:oracle:netra_sparc_t4-1", "vulnerable": true }, { "cpe22Uri": "cpe:/h:oracle:netra_sparc_t4-1b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:oracle:netra_sparc_t4-2", "vulnerable": true }, { "cpe22Uri": "cpe:/o:oracle:sparc_t-series_server_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:oracle:sparc_t3-1", "vulnerable": true }, { "cpe22Uri": "cpe:/h:oracle:sparc_t3-1b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:oracle:sparc_t3-2", "vulnerable": true }, { "cpe22Uri": "cpe:/h:oracle:sparc_t3-4", "vulnerable": true }, { "cpe22Uri": "cpe:/h:oracle:sparc_t4-1", "vulnerable": true }, { "cpe22Uri": "cpe:/h:oracle:sparc_t4-1b", "vulnerable": true }, { "cpe22Uri": "cpe:/h:oracle:sparc_t4-2", "vulnerable": true }, { "cpe22Uri": "cpe:/h:oracle:sparc_t4-4", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-003203" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Oracle", "sources": [ { "db": "BID", "id": "54564" } ], "trust": 0.3 }, "cve": "CVE-2012-3128", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 3.7, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 1.9, "id": "CVE-2012-3128", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 1.8, "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 3.7, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 1.9, "id": "VHN-56409", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:H/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-3128", "trust": 1.0, "value": "LOW" }, { "author": "NVD", "id": "CVE-2012-3128", "trust": 0.8, "value": "Low" }, { "author": "CNNVD", "id": "CNNVD-201207-336", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-56409", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-56409" }, { "db": "JVNDB", "id": "JVNDB-2012-003203" }, { "db": "CNNVD", "id": "CNNVD-201207-336" }, { "db": "NVD", "id": "CVE-2012-3128" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unspecified vulnerability in Oracle SPARC T-Series Servers running System Firmware 8.2.0 and 8.1.4.e or earlier allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Integrated Lights Out Manager. (DoS) An attack may be carried out. Oracle Sun Products Suite is prone to a local vulnerability in SPARC T-Series Servers. \nThe \u0027Integrated Lights Out Manager\u0027 sub component is affected. \nThis vulnerability affects the following supported versions:\nSystem Firmware 8.1.4.e or earlier, System Firmware 8.2.0", "sources": [ { "db": "NVD", "id": "CVE-2012-3128" }, { "db": "JVNDB", "id": "JVNDB-2012-003203" }, { "db": "BID", "id": "54564" }, { "db": "VULHUB", "id": "VHN-56409" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-3128", "trust": 2.8 }, { "db": "BID", "id": "54564", "trust": 1.4 }, { "db": "SECTRACK", "id": "1027275", "trust": 1.1 }, { "db": "OSVDB", "id": "83973", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2012-003203", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201207-336", "trust": 0.7 }, { "db": "NSFOCUS", "id": "20025", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-56409", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-56409" }, { "db": "BID", "id": "54564" }, { "db": "JVNDB", "id": "JVNDB-2012-003203" }, { "db": "CNNVD", "id": "CNNVD-201207-336" }, { "db": "NVD", "id": "CVE-2012-3128" } ] }, "id": "VAR-201207-0147", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-56409" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:53:32.041000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Text Form of Oracle Critical Patch Update - July 2012 Risk Matrices", "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012verbose-392736.html" }, { "title": "Oracle Critical Patch Update Advisory - July 2012", "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html" }, { "title": "July 2012 Critical Patch Update Released", "trust": 0.8, "url": "https://blogs.oracle.com/security/entry/july_2012_critical_patch_update" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-003203" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2012-3128" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/54564" }, { "trust": 1.1, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2013:150" }, { "trust": 1.1, "url": "http://osvdb.org/83973" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id?1027275" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77057" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3128" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-3128" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/20025" } ], "sources": [ { "db": "VULHUB", "id": "VHN-56409" }, { "db": "JVNDB", "id": "JVNDB-2012-003203" }, { "db": "CNNVD", "id": "CNNVD-201207-336" }, { "db": "NVD", "id": "CVE-2012-3128" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-56409" }, { "db": "BID", "id": "54564" }, { "db": "JVNDB", "id": "JVNDB-2012-003203" }, { "db": "CNNVD", "id": "CNNVD-201207-336" }, { "db": "NVD", "id": "CVE-2012-3128" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-07-17T00:00:00", "db": "VULHUB", "id": "VHN-56409" }, { "date": "2012-07-17T00:00:00", "db": "BID", "id": "54564" }, { "date": "2012-07-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-003203" }, { "date": "2012-07-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201207-336" }, { "date": "2012-07-17T23:55:03.567000", "db": "NVD", "id": "CVE-2012-3128" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-08-29T00:00:00", "db": "VULHUB", "id": "VHN-56409" }, { "date": "2013-10-09T02:55:00", "db": "BID", "id": "54564" }, { "date": "2012-07-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-003203" }, { "date": "2012-07-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201207-336" }, { "date": "2024-11-21T01:40:15.553000", "db": "NVD", "id": "CVE-2012-3128" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "54564" }, { "db": "CNNVD", "id": "CNNVD-201207-336" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Oracle SPARC T Series server firmware Integrated Lights Out Manager Processing vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-003203" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unknown", "sources": [ { "db": "BID", "id": "54564" } ], "trust": 0.3 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…