Note: This is an archival copy of Security Sun Alert 264730 as previously published on http://sunsolve.sun.com.|
Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1020780.1.
Solaris 10 Operating System
Date of Resolved Release
A security vulnerability in Solaris Sockets Direct Protocol (SDP) driver (sdp(7D)):
A security vulnerability in Solaris Sockets Direct Protocol (SDP) driver (sdp(7D)) may allow a local or remote unprivileged user to exhaust all kernel memory. This is a type of Denial of Service (DoS).
Note: No applications bundled with Solaris are affected by this issue however third-party applications which make use of SDP may be affected.
2. Contributing Factors
This issue can occur in the following releases:
Note 2: OpenSolaris distributions may include additional bug fixes above and beyond the build from which it was derived. To determine the base build of OpenSolaris, the following command can be used:
$ uname -v
Note 3: This issue only affects applications written to use the Sockets Direct Protocol (SDP) driver. No applications shipped with Solaris are affected by this issue. To determine if Solaris Sockets Direct Protocol (SDP) is enabled, execute the following command:
$ sdpadm status3. Symptoms
There are no predictable symptoms that would indicate the described vulnerability has been exploited.
There is no workaround for this issue. Please see the Resolution section below.
This issue is addressed in the following releases:
Copyright 2000-2009 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved.
02-Dec-2009: Updated Contributing Factors section.
This solution has no attachment