Sun Java System Portal Server May Execute Arbitrary Code in XML Signatures
|
|
SecurityTracker Alert ID: 1018513 |
|
SecurityTracker URL: http://securitytracker.com/id/1018513
|
|
CVE Reference:
CVE-2007-4289
(Links to External Site)
|
Updated: Apr 21 2008
|
Original Entry Date: Aug 6 2007
|
Impact:
Execution of arbitrary code via network, User access via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 7.0
|
Description:
A vulnerability was reported in Sun Java System Portal Server. A remote user can cause arbitrary code to be executed on the target system.
A remote user can create a specially crafted XSLT style sheet within an XSLT transform within an XML signature that, when loaded by the target system, will execute arbitrary code on the target system.
Sun credits Brad Hill of iSEC Partners with reporting this vulnerability.
|
Impact:
A remote user can execute arbitrary code on the target system.
|
Solution:
Sun has issued the following fixes.
SPARC Platform
* Sun Java System Portal Server Software 7.0 (for Solaris 8, 9 and 10) with patch 121913-15 or later
x86 Platform
* Sun Java System Portal Server Software 7.0 (for Solaris 8, 9 and 10) with patch 121914-15 or later
Linux Platform
* Sun Java System Portal Server Software 7.0 with patch 121915-15 or later
The Sun advisory is available at:
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103015-1
|
Vendor URL: sunsolve.sun.com/search/document.do?assetkey=1-26-103015-1 (Links to External Site)
|
Cause:
Access control error
|
Underlying OS: Linux (Any), UNIX (Solaris - SunOS)
|
|
Message History:
None.
|
Source Message Contents
|
|
|
[Original Message Not Available for Viewing]
|
|