Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Solaris Local Security Checks >> Solaris 2.6 (sparc) : 105669-11


Vulnerability Assessment Details

Solaris 2.6 (sparc) : 105669-11

Vulnerability Assessment Summary
Check for patch 105669-11

Detailed Explanation for this Vulnerability Assessment

The remote host is missing Sun Security Patch number 105669-11
(CDE 1.2: libDtSvc Patch).

You should install this patch for your system to be up-to-date.

Solution : http://sunsolve.sun.com/search/document.do?assetkey=1-21-105669-11-1
Network Security Threat Level: High

Networks Security ID: 3517

Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security

Cables, Connectors

Pair of Intel Xeon X5660 2.8GHz Six Core (BX80614X5660) Processors
$28.0
Pair of Intel Xeon X5660 2.8GHz Six Core (BX80614X5660) Processors pictureINTEL XEON E5-2696v3 SR1XK 18-CORE 2.3GHz 18-CORE 2.3GHz Processor CPU
$450.0
INTEL XEON E5-2696v3 SR1XK 18-CORE 2.3GHz 18-CORE 2.3GHz Processor CPU pictureIBM Blade Server HS21 8853AC1 with 2x Xeon 5150, 4x 2G DDR2c Qlogic 4Gb Fiber
$74.29
IBM Blade Server HS21 8853AC1 with 2x Xeon 5150, 4x 2G DDR2c Qlogic 4Gb Fiber pictureHP Z8 G4 Intel Xeon platinum 8168 /SSD 512 / 32GB DDR4 / Nvidia Quadro K2200
$1.0
HP Z8 G4 Intel Xeon platinum 8168 /SSD 512 / 32GB DDR4 / Nvidia Quadro K2200 picture


Discussions

No Discussions have been posted on this vulnerability.