[<prev] [next>] [day] [month] [year] [list]
Message-ID: <!&!AAAAAAAAAAAYAAAAAAAAAEqlc0sEqCZMjFiSy1tj+RPCgAAAEAAAANPiJ95jgKBHsECXO//fi0QBAAAAAA==@nruns.com>
Date: Tue, 17 Apr 2007 23:06:16 +0200
From: <security@...ns.com>
To: <full-disclosure@...ts.grok.org.uk>,
"'BugTraq'" <bugtraq@...urityfocus.com>
Subject: n.runs-SA-2007.007 - Sun Solaris 10 - Format string vulnerability
n.runs AG
http://www.nruns.com/ security at
nruns.com
n.runs-SA-2007.007
18-Apr-2007
____________________________________________________________________________
___
Vendor: Sun Microsystems, Inc., http://www.sun.com
Affected Products: Solaris 10, Java Web Console 2.2.2 - 2.2.5
Vulnerability: Format string vulnerability
Risk: HIGH
CVE ID: CVE-2007-1681
Sun Alert ID: 102854
SUN bug ID: 6505096
Vendor communication:
2006/12/10 Initial notification of the Sun Security
Coordination
Team.
2006/12/15 Sending reminder.
2006/12/15 Sun provides feedback about the further procedure.
2006/12/23 Sun confirms vulnerability and assigns bug ID.
2007/02/06 Requesting update.
2007/02/07 Sun provides feedback.
Fix for the most recent version ready.
2007/02/14 Sun informs n.runs that the fix for Sun Java Web
Console 2.2.4 has been approved and will soon be
integrated. Fixes were identified for all other
vulnerable versions.
2007/03/05 Requesting update.
2007/03/07 Sun awaits patch generation and the start of
testing cycles.
2007/03/20 Sun informs n.runs that patches will be released for
Solaris 10. Unbundled versions have to be upgraded
to
version 2.2.6.
2007/03/25 Requesting Sun Alert draft.
2007/03/31 Sun sends draft of Sun Alert. Patches have been
completed and the upgrade release is in work.
2007/04/14 Sun sents public disclosure date.
Systems Affected:
According to the Sun Security Coordination Team, Solaris 10 Operating
System,
Sun Java Web Console 2.2.2, Sun Java Web Console 2.2.3, Sun Java Web Console
2.2.4 and Sun Java Web Console 2.2.5 are affected.
The existence of the vulnerability was verified by n.runs on fully-patched
installations of Solaris 10 6/06 on SPARC and x86 Platform running Sun Java
Web Console 2.2.4.
Overview:
A remote exploitable format string vulnerability has been identified in the
in
the Sun Java Web Console [1].
Description:
The Sun Java Web Console is vulnerable to a format string vulnerability.
The root cause of the format string vulnerability lies in the logging of
failed
logins, therefore this vulnerability is exploitable by unauthenticated
remote
users.
The vulnerability exists as the libc syslog function is called in
/usr/lib/libwebconsole_services.so with two (2) instead of at least three
(3)
arguments which enables an attacker to influence the message buffer.
Impact:
The exploitation of this vulnerability may result in unauthorised remote
code
execution or cause a denial of service condition by crashing the Java Web
Console service.
Solution:
Update to Sun Java Web Console 2.2.6 or later.
Patches for Solaris 10 were released by SUN Microsystems to address this
issue,
a workaround designed by Sun Microsystems is available. [2]
Credit:
Vulnerability found by Frank Dick of n.runs AG.
Additional credits to Felix Lindner of Sabre Labs GmbH for supporting the
vulnerability research.
References:
[1] http://docs.sun.com/app/docs/doc/817-1985/6mhm8o5kh?a=view
[2] http://sunsolve.sun.com/search/document.do?assetkey=1-26-102854-1
____________________________________________________________________________
___
Unaltered electronic reproduction of this advisory is permitted. For all
other
reproduction or publication, in printing or otherwise, contact
security@...ns.com for permission.
Use of the advisory constitutes acceptance for use in an "as is" condition.
All warranties are excluded. In no event shall n.runs be liable for any
damages
whatsoever including direct, indirect, incidental, consequential, loss of
business profits or special damages, even if n.runs has been advised of the
possibility of such damages.
Copyright 2007 n.runs AG. All rights reserved. Terms of apply.
Powered by blists - more mailing lists