Solaris 10 Kernel Patch Versions

This guide covers Quick how to configure DNS client on Solaris 11.DNS client configuration in Solaris 11 is based on SMF service rather than file based. When you configure a system as DNS client, you will be performing the following two configurations.I. DNS client setupII. Configure Name service switch to use DNSI. DNS client setup 1. Configure using SMF service network/dns/client# svccfg -s network/dns/clientsvc:/network/dns/client setprop config/search = astring: ('test.com' 'service.test.com')svc:/network/dns/client setprop config/nameserver = netaddress: (192.168.10.10 192.168.10.11)svc:/network/dns/client exit2. Enable the DNS client service (when you configure it for the first time)#svccfg enable -r dns/client3.

  1. Solaris 10 Kernel Patch Versions 10

Restart/Refresh DNS client service (It is done when there is any update to the configuration)#svcadm refresh dns/client#svcadm restart dns/client4. Verify /etc/resolv.conf if it is updated with the changes.# more /etc/resolv.c. Boot PROM BasicsBoot PROM(programmable read only memory):It is a firmware (also known as the monitor program) provides:1. Basic hardware testing & initialization before booting.2.

Solaris 10 Kernel Patch Versions

Contains a user interface that provide access to many important functions.3. Enables the system to boot from wide range of devices.Itcontrols the system operation before the kernel becomes available. Itprovides a user interface and firmware utility commands known as FORTHcommand set.

These commands include the boot commands, the diagnosticcommands & the commands for modifying the default configuration.Command to determine the version of the Open Boot PROM on the system:# /usr/platform/'uname -m'/sbin/prtdiag -v(output omitted)System PROM revisions:-OBP 4.16.4 2004/12/18 05:21 Sun Blade 1500 (Silver)OBDIAG 4.16.4.2004/12/18 05:21# prtconf -vOBP 4.16.4 2004/12/18 05:21Open Boot Architectures Standards:Itis based on IEEE standard #1275, according to which the o.

DescriptionVulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel RPC). For supported versions that are affected see note. Easily 'exploitable' vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Solaris. While the vulnerability is in Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Solaris.

Note: CVE-2017-3623 is assigned for 'Ebbisland'. Solaris 10 systems which have had any Kernel patch installed after, or updated via patching tools since 2012-01-26 are not impacted. Also, any Solaris 10 system installed with Solaris 10 1/13 (Solaris 10 Update 11) are not vulnerable. Solaris 11 is not impacted by this issue.

Kernel

CVSS 3.0 Base Score 10.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). Solution(s).

Solaris 10 Kernel Patch Versions 10

sunpatch-solaris-150401Related Vulnerabilities.