CVE-2010-0453
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
03/02/2010
Last modified:
11/04/2025
Description
The ucode_ioctl function in intel/io/ucode_drv.c in Sun Solaris 10 and OpenSolaris snv_69 through snv_133, when running on x86 architectures, allows local users to cause a denial of service (panic) via a request with a 0 size value to the UCODE_GET_VERSION IOCTL, which triggers a NULL pointer dereference in the ucode_get_rev function, related to retrieval of the microcode revision.
Impact
Base Score 2.0
4.90
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:sun:opensolaris:snv_69:*:x86:*:*:*:*:* | ||
cpe:2.3:o:sun:opensolaris:snv_70:*:x86:*:*:*:*:* | ||
cpe:2.3:o:sun:opensolaris:snv_71:*:x86:*:*:*:*:* | ||
cpe:2.3:o:sun:opensolaris:snv_72:*:x86:*:*:*:*:* | ||
cpe:2.3:o:sun:opensolaris:snv_73:*:x86:*:*:*:*:* | ||
cpe:2.3:o:sun:opensolaris:snv_74:*:x86:*:*:*:*:* | ||
cpe:2.3:o:sun:opensolaris:snv_75:*:x86:*:*:*:*:* | ||
cpe:2.3:o:sun:opensolaris:snv_76:*:x86:*:*:*:*:* | ||
cpe:2.3:o:sun:opensolaris:snv_77:*:x86:*:*:*:*:* | ||
cpe:2.3:o:sun:opensolaris:snv_78:*:x86:*:*:*:*:* | ||
cpe:2.3:o:sun:opensolaris:snv_79:*:x86:*:*:*:*:* | ||
cpe:2.3:o:sun:opensolaris:snv_80:*:x86:*:*:*:*:* | ||
cpe:2.3:o:sun:opensolaris:snv_81:*:x86:*:*:*:*:* | ||
cpe:2.3:o:sun:opensolaris:snv_82:*:x86:*:*:*:*:* | ||
cpe:2.3:o:sun:opensolaris:snv_83:*:x86:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://osvdb.org/62046
- http://secunia.com/advisories/38452
- http://sunsolve.sun.com/search/document.do?assetkey=1-21-143913-01-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-275910-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021799.1-1
- http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html
- http://www.securityfocus.com/archive/1/509276/100/0/threaded
- http://www.securityfocus.com/bid/38016
- http://www.trapkit.de/advisories/TKADV2010-001.txt
- http://www.us-cert.gov/cas/techalerts/TA10-103B.html
- http://www.vupen.com/english/advisories/2010/0270
- https://exchange.xforce.ibmcloud.com/vulnerabilities/55991
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6959
- http://osvdb.org/62046
- http://secunia.com/advisories/38452
- http://sunsolve.sun.com/search/document.do?assetkey=1-21-143913-01-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-275910-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021799.1-1
- http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html
- http://www.securityfocus.com/archive/1/509276/100/0/threaded
- http://www.securityfocus.com/bid/38016
- http://www.trapkit.de/advisories/TKADV2010-001.txt
- http://www.us-cert.gov/cas/techalerts/TA10-103B.html
- http://www.vupen.com/english/advisories/2010/0270
- https://exchange.xforce.ibmcloud.com/vulnerabilities/55991
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6959