Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2009-4226

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-08 Dec, 2009 | 18:00
Updated At-07 Aug, 2024 | 06:54
Rejected At-
Credits

Race condition in the IP module in the kernel in Sun OpenSolaris snv_106 through snv_124 allows remote attackers to cause a denial of service (NULL pointer dereference and panic) via unspecified vectors related to the (1) tcp_do_getsockname or (2) tcp_do_getpeername function.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:08 Dec, 2009 | 18:00
Updated At:07 Aug, 2024 | 06:54
Rejected At:
▼CVE Numbering Authority (CNA)

Race condition in the IP module in the kernel in Sun OpenSolaris snv_106 through snv_124 allows remote attackers to cause a denial of service (NULL pointer dereference and panic) via unspecified vectors related to the (1) tcp_do_getsockname or (2) tcp_do_getpeername function.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://exchange.xforce.ibmcloud.com/vulnerabilities/54574
vdb-entry
x_refsource_XF
http://www.vupen.com/english/advisories/2009/3413
vdb-entry
x_refsource_VUPEN
http://sunsolve.sun.com/search/document.do?assetkey=1-66-268189-1
vendor-advisory
x_refsource_SUNALERT
http://opensolaris.org/jive/thread.jspa?messageID=415069&tstart=0
x_refsource_CONFIRM
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/54574
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://www.vupen.com/english/advisories/2009/3413
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-268189-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: http://opensolaris.org/jive/thread.jspa?messageID=415069&tstart=0
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://exchange.xforce.ibmcloud.com/vulnerabilities/54574
vdb-entry
x_refsource_XF
x_transferred
http://www.vupen.com/english/advisories/2009/3413
vdb-entry
x_refsource_VUPEN
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-66-268189-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
http://opensolaris.org/jive/thread.jspa?messageID=415069&tstart=0
x_refsource_CONFIRM
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/54574
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2009/3413
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-268189-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: http://opensolaris.org/jive/thread.jspa?messageID=415069&tstart=0
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:08 Dec, 2009 | 18:30
Updated At:17 Aug, 2017 | 01:31

Race condition in the IP module in the kernel in Sun OpenSolaris snv_106 through snv_124 allows remote attackers to cause a denial of service (NULL pointer dereference and panic) via unspecified vectors related to the (1) tcp_do_getsockname or (2) tcp_do_getpeername function.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.1HIGH
AV:N/AC:M/Au:N/C:N/I:N/A:C
Type: Primary
Version: 2.0
Base score: 7.1
Base severity: HIGH
Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:C
CPE Matches

Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_106
cpe:2.3:o:sun:opensolaris:snv_106:*:sparc:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_106
cpe:2.3:o:sun:opensolaris:snv_106:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_107
cpe:2.3:o:sun:opensolaris:snv_107:*:sparc:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_107
cpe:2.3:o:sun:opensolaris:snv_107:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_108
cpe:2.3:o:sun:opensolaris:snv_108:*:sparc:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_108
cpe:2.3:o:sun:opensolaris:snv_108:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_109
cpe:2.3:o:sun:opensolaris:snv_109:*:sparc:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_109
cpe:2.3:o:sun:opensolaris:snv_109:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_110
cpe:2.3:o:sun:opensolaris:snv_110:*:sparc:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_110
cpe:2.3:o:sun:opensolaris:snv_110:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_111
cpe:2.3:o:sun:opensolaris:snv_111:*:sparc:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_111
cpe:2.3:o:sun:opensolaris:snv_111:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_112
cpe:2.3:o:sun:opensolaris:snv_112:*:sparc:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_112
cpe:2.3:o:sun:opensolaris:snv_112:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_113
cpe:2.3:o:sun:opensolaris:snv_113:*:sparc:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_113
cpe:2.3:o:sun:opensolaris:snv_113:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_114
cpe:2.3:o:sun:opensolaris:snv_114:*:sparc:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_114
cpe:2.3:o:sun:opensolaris:snv_114:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_115
cpe:2.3:o:sun:opensolaris:snv_115:*:sparc:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_115
cpe:2.3:o:sun:opensolaris:snv_115:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_116
cpe:2.3:o:sun:opensolaris:snv_116:*:sparc:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_116
cpe:2.3:o:sun:opensolaris:snv_116:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_117
cpe:2.3:o:sun:opensolaris:snv_117:*:sparc:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_117
cpe:2.3:o:sun:opensolaris:snv_117:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_118
cpe:2.3:o:sun:opensolaris:snv_118:*:sparc:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_118
cpe:2.3:o:sun:opensolaris:snv_118:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_119
cpe:2.3:o:sun:opensolaris:snv_119:*:sparc:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_119
cpe:2.3:o:sun:opensolaris:snv_119:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_120
cpe:2.3:o:sun:opensolaris:snv_120:*:sparc:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_120
cpe:2.3:o:sun:opensolaris:snv_120:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_121
cpe:2.3:o:sun:opensolaris:snv_121:*:sparc:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_121
cpe:2.3:o:sun:opensolaris:snv_121:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_122
cpe:2.3:o:sun:opensolaris:snv_122:*:sparc:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_122
cpe:2.3:o:sun:opensolaris:snv_122:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_123
cpe:2.3:o:sun:opensolaris:snv_123:*:sparc:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_123
cpe:2.3:o:sun:opensolaris:snv_123:*:x86:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_124
cpe:2.3:o:sun:opensolaris:snv_124:*:sparc:*:*:*:*:*
Sun Microsystems (Oracle Corporation)
sun
>>opensolaris>>snv_124
cpe:2.3:o:sun:opensolaris:snv_124:*:x86:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-362Primarynvd@nist.gov
CWE ID: CWE-362
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://opensolaris.org/jive/thread.jspa?messageID=415069&tstart=0cve@mitre.org
Exploit
http://sunsolve.sun.com/search/document.do?assetkey=1-66-268189-1cve@mitre.org
Patch
Vendor Advisory
http://www.vupen.com/english/advisories/2009/3413cve@mitre.org
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/54574cve@mitre.org
N/A
Hyperlink: http://opensolaris.org/jive/thread.jspa?messageID=415069&tstart=0
Source: cve@mitre.org
Resource:
Exploit
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-268189-1
Source: cve@mitre.org
Resource:
Patch
Vendor Advisory
Hyperlink: http://www.vupen.com/english/advisories/2009/3413
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/54574
Source: cve@mitre.org
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

56Records found

CVE-2014-2672
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.1||HIGH
EPSS-0.74% / 71.88%
||
7 Day CHG~0.00%
Published-01 Apr, 2014 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Race condition in the ath_tx_aggr_sleep function in drivers/net/wireless/ath/ath9k/xmit.c in the Linux kernel before 3.13.7 allows remote attackers to cause a denial of service (system crash) via a large amount of network traffic that triggers certain list deletions.

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-linux_kerneln/a
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2014-0616
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.1||HIGH
EPSS-0.61% / 68.66%
||
7 Day CHG~0.00%
Published-14 Jan, 2014 | 18:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Juniper Junos 10.4 before 10.4R16, 11.4 before 11.4R10, 12.1R before 12.1R8-S2, 12.1X44 before 12.1X44-D30, 12.1X45 before 12.1X45-D20, 12.1X46 before 12.1X46-D10, 12.2 before 12.2R7, 12.3 before 12.3R4-S2, 13.1 before 13.1R3-S1, 13.2 before 13.2R2, and 13.3 before 13.3R1 allows remote attackers to cause a denial of service (rdp crash) via a large BGP UPDATE message which immediately triggers a withdraw message to be sent, as demonstrated by a long AS_PATH and a large number of BGP Communities.

Action-Not Available
Vendor-n/aJuniper Networks, Inc.
Product-junosn/a
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2014-0710
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.1||HIGH
EPSS-0.31% / 53.51%
||
7 Day CHG~0.00%
Published-22 Feb, 2014 | 21:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Race condition in the cut-through proxy feature in Cisco Firewall Services Module (FWSM) Software 3.x before 3.2(28) and 4.x before 4.1(15) allows remote attackers to cause a denial of service (device reload) via certain matching traffic, aka Bug ID CSCuj16824.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-firewall_services_module_softwaren/a
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2007-3091
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.1||HIGH
EPSS-18.45% / 94.98%
||
7 Day CHG~0.00%
Published-06 Jun, 2007 | 21:00
Updated-07 Aug, 2024 | 14:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Race condition in Microsoft Internet Explorer 6 SP1; 6 and 7 for Windows XP SP2 and SP3; 6 and 7 for Server 2003 SP2; 7 for Vista Gold, SP1, and SP2; and 7 for Server 2008 SP2 allows remote attackers to execute arbitrary code or perform other actions upon a page transition, with the permissions of the old page and the content of the new page, as demonstrated by setInterval functions that set location.href within a try/catch expression, aka the "bait & switch vulnerability" or "Race Condition Cross-Domain Information Disclosure Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-internet_explorerwindows_vistawindows_server_2008windows_2003_serverwindows_xpwindows_2000n/a
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2020-3163
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.35% / 56.59%
||
7 Day CHG~0.00%
Published-19 Feb, 2020 | 19:15
Updated-15 Nov, 2024 | 17:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Unified Contact Center Enterprise Denial of Service Vulnerability

A vulnerability in the Live Data server of Cisco Unified Contact Center Enterprise could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability exists because the affected software improperly manages resources when processing inbound Live Data traffic. An attacker could exploit this vulnerability by sending multiple crafted Live Data packets to an affected device. A successful exploit could cause the affected device to run out of buffer resources, which could result in a stack overflow and cause the affected device to reload, resulting in a DoS condition. Note: The Live Data port in Cisco Unified Contact Center Enterprise devices allows only a single TCP connection. To exploit this vulnerability, an attacker would have to send crafted packets to an affected device before a legitimate Live Data client establishes a connection.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-unified_contact_center_enterpriseCisco Unified Contact Center Enterprise
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2013-5512
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.1||HIGH
EPSS-0.11% / 30.19%
||
7 Day CHG~0.00%
Published-13 Oct, 2013 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Race condition in the HTTP Deep Packet Inspection (DPI) feature in Cisco Adaptive Security Appliance (ASA) Software 8.2.x before 8.2(5.46), 8.3.x before 8.3(2.39), 8.4.x before 8.4(5.5), 8.5.x before 8.5(1.18), 8.6.x before 8.6(1.12), 8.7.x before 8.7(1.4), 9.0.x before 9.0(1.4), and 9.1.x before 9.1(1.2), in certain conditions involving the spoof-server option or ActiveX or Java response inspection, allows remote attackers to cause a denial of service (device reload) via a crafted HTTP response, aka Bug ID CSCud37992.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-adaptive_security_appliance_softwaren/a
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
  • Previous
  • 1
  • 2
  • Next
Details not found