Unrated severityNVD Advisory· Published Oct 5, 2011· Updated Apr 29, 2026
CVE-2008-7300
CVE-2008-7300
Description
The labeled networking implementation in Solaris Trusted Extensions in Sun Solaris 10 and OpenSolaris snv_39 through snv_67, when a labeled zone is in the installed state, allows remote authenticated users to bypass a Mandatory Access Control (MAC) policy and obtain access to the global zone.
Affected products
8cpe:2.3:o:sun:opensolaris:build_snv_39:*:*:*:*:*:*:*+ 5 more
- cpe:2.3:o:sun:opensolaris:build_snv_39:*:*:*:*:*:*:*
- cpe:2.3:o:sun:opensolaris:build_snv_47:*:*:*:*:*:*:*
- cpe:2.3:o:sun:opensolaris:build_snv_59:*:*:*:*:*:*:*
- cpe:2.3:o:sun:opensolaris:build_snv_64:*:*:*:*:*:*:*
- cpe:2.3:o:sun:opensolaris:build_snv_67:*:*:*:*:*:*:*
- (no CPE)range: snv_39 to snv_67
- cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- secunia.com/advisories/31412nvdVendor Advisory
- sunsolve.sun.com/search/document.donvd
- www.securityfocus.com/bid/30602nvd
News mentions
0No linked articles in our index yet.