Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Solaris Local Security Checks >> Solaris 2.5.1 (sparc) : 107851-26


Vulnerability Assessment Details

Solaris 2.5.1 (sparc) : 107851-26

Vulnerability Assessment Summary
Check for patch 107851-26

Detailed Explanation for this Vulnerability Assessment

The remote host is missing Sun Security Patch number 107851-26
(PGX32 2.1: Graphics Patch).

You should install this patch for your system to be up-to-date.

Solution : http://sunsolve.sun.com/search/document.do?assetkey=1-21-107851-26-1
Network Security Threat Level: High

Networks Security ID: 5390

Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security

Cables, Connectors

Cisco WS-C2960X-48LPS-L Catalyst 48 GigE LAN BASE NIB Smartnatable
$1510.0
Cisco WS-C2960X-48LPS-L Catalyst 48 GigE  LAN BASE NIB Smartnatable pictureCISCO HWIC-2T 2-Port Serial WAN Interface Card
$99.0
CISCO HWIC-2T 2-Port Serial WAN Interface Card pictureCisco WS-C2960X-48FPD-L 48 POE+ GE+2 10G SFP+, LAN Base NIB
$2199.0
Cisco WS-C2960X-48FPD-L 48 POE+ GE+2 10G SFP+, LAN Base NIB pictureCISCO CPU INTEL XEON 12 CORE 12C PROCESSOR E5-2650V4 2.2GHZ 30MB UCS-CPU-E52650E
$1395.0
CISCO CPU INTEL XEON 12 CORE 12C PROCESSOR E5-2650V4 2.2GHZ 30MB UCS-CPU-E52650E picture


Discussions

No Discussions have been posted on this vulnerability.