SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   Sun Java System Access Manager Vendors:   Sun
Sun Java System Access Manager XML Signature Processing Bug Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1020380
SecurityTracker URL:  http://securitytracker.com/id/1020380
CVE Reference:   CVE-2008-2945   (Links to External Site)
Updated:  Dec 26 2008
Original Entry Date:  Jun 27 2008
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 6 2005Q1, 7.1, 7 2005Q4
Description:   A vulnerability was reported in Sun Java System Access Manager. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create an XML signature with a specially crafted XSLT stylesheet inside an XSLT transform that, when viewed by the target user via the Access Manager, will execute arbitrary code on the target system. The code will run with the privileges of the Access Manager application.

Sun Java System Identity Server versions 6.1 and 6.2 are also affected.

Brad Hill of iSEC Partners reported this vulnerability.

Impact:   A remote user can create an XML signature that, when viewed by the target user, will execute arbitrary code on the target user's system.
Solution:   Sun has issued the following fixes.

SPARC Platform:

* Sun Java System Access Manager 7.1 (for Solaris 8, 9 and 10) with patch 126356-01 or later
* Sun Java System Access Manager 7 2005Q4 (for Solaris 8, 9 and 10) with patch 120954-06 or later
* Sun Java System Access Manager 6.3 2005Q1 (for Solaris 8, 9 and 10) with patch 119465-12 or later
* Sun Java System Identity Server 6.2 (for Solaris 8 and 9) with patch 115766-15 or later
* Sun Java System Identity Server 6.1 (for Solaris 8 and 9) with patch 117586-22 or later

x86 Platform:

* Sun Java System Access Manager 7.1 (for Solaris 8, 9 and 10) with patch 126357-01 or later
* Sun Java System Access Manager 7 2005Q4 (for Solaris 9 and 10) with patch 120955-06 or later
* Sun Java System Access Manager 6.3 2005Q1 (for Solaris 8, 9 and 10) with patch 119465-12 or later
* Sun Java System Identity Server 6.2 (for Solaris 8 and 9) with patch 120091-15 or later

Linux:

* Sun Java System Access Manager 7.1 with patch 126358-01 or later
* Sun Java System Access Manager 7 2005Q4 with patch 120956-06 or later
* Sun Java System Access Manager 6.3 2005Q1 with patch 119502-12 or later

Windows:

* Sun Java System Access Manager 7.1 with patch 126359-01 or later
* Sun Java System Access Manager 7 2005Q4 with patch 124296-06 or later

HP-UX:

* Sun Java System Access Manager 7 2005Q4 with patch 126371-06 or later

Other:

* Sun Java System Access Manager 7.1 WAR file-based installation (all platforms) with patch 140504-01 or later

The vendor's advisory is available at:

http://sunsolve.sun.com/search/document.do?assetkey=1-66-201538-1

Vendor URL:  sunsolve.sun.com/search/document.do?assetkey=1-66-201538-1 (Links to External Site)
Cause:   Not specified
Underlying OS:  Linux (Any), UNIX (HP/UX), UNIX (Solaris - SunOS), Windows (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC