SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Directory)  >   Sun ONE Directory Server Vendors:   Oracle, Sun
Sun Java System Directory Server Bugs Let Remote Users Deny Service and Execute Arbitrary Code
SecurityTracker Alert ID:  1023876
SecurityTracker URL:  http://securitytracker.com/id/1023876
CVE Reference:   CVE-2010-0897   (Links to External Site)
Date:  Apr 14 2010
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 5.2, 6.0, 6.1, 6.2, 6.3, 6.3.1
Description:   A vulnerability was reported in Sun Java System Directory Server. A remote user can cause denial of service conditions. A remote user can execute arbitrary code.

A remote user can send a DSML-over-HTTP request containing specially crafted UTF-8 characters to cause the target application to fail.

A remote user can send a specially crafted LDAP query to trigger a buffer overflow and execute arbitrary code.

A remote user can send a DSML-over-HTTP request with a specially crafted username to trigger a null pointer dereference and cause the web service to fail.

A remote user can send a specially crafted DSML message to cause the target directory service to crash.

The vendor was notified of the first three vulnerabilities on October 27, 2009.

Anonymous researcher(s) reported some of these vulnerabilities via TippingPoint.

Impact:   A remote user can cause partial denial of service conditions.

A remote user can execute arbitrary code on the target system.

Solution:   The vendor has issued a fix.

For Solaris 9 and 10 on SPARC, x86 and x64 platforms, Linux, HP-UX and Windows):

* Sun Java System Directory Server Enterprise Edition 6.3.1 with patch 143463-01 or later

Systems with Sun Java System Directory Server Enterprise Edition versions
before 6.3.1 are recommended to upgrade to 6.3.1 and then install the
resolution patch listed above.

The upgrade procedure is described in "Sun Java System Directory Server
Enterprise Edition 6.3.1 Release Notes" in Chapter 2 at:

http://docs.sun.com/doc/820-5817/gibic

For Solaris 9 and 10 on SPARC, x86 and x64 platforms, Linux, HP-UX, AIX and Windows):

* Sun Java System Directory Server 5.2 Patch 6 with patch 143462-01 or later

Systems with Sun Java System Directory Server 5.2 versions before 5.2 Patch 6
are recommended to upgrade to 5.2 Patch 6 and then install the resolution patch
listed above.

The upgrade procedure is described in "Sun Java System Directory Server 5.2
Patch 6 Release Notes" in the Installation Chapter at :

http://docs.sun.com/doc/820-3003

The vendor's advisory is available at:

http://sunsolve.sun.com/search/document.do?assetkey=1-66-276210-1

Vendor URL:  sunsolve.sun.com/search/document.do?assetkey=1-66-276210-1 (Links to External Site)
Cause:   Access control error, Boundary error
Underlying OS:  Linux (Any), UNIX (AIX), UNIX (HP/UX), UNIX (Solaris - SunOS), Windows (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC