lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <!&!AAAAAAAAAAAYAAAAAAAAAEqlc0sEqCZMjFiSy1tj+RPCgAAAEAAAANPiJ95jgKBHsECXO//fi0QBAAAAAA==@nruns.com>
Date: Tue, 17 Apr 2007 23:06:16 +0200
From: <security@...ns.com>
To: <full-disclosure@...ts.grok.org.uk>,
	"'BugTraq'" <bugtraq@...urityfocus.com>
Subject: n.runs-SA-2007.007 - Sun Solaris 10 - Format
	string vulnerability

n.runs AG
http://www.nruns.com/                                     security at
nruns.com
n.runs-SA-2007.007
18-Apr-2007

____________________________________________________________________________
___

Vendor:                 Sun Microsystems, Inc., http://www.sun.com
Affected Products:      Solaris 10, Java Web Console 2.2.2 - 2.2.5
Vulnerability:          Format string vulnerability

Risk:                   HIGH
CVE ID:                 CVE-2007-1681
Sun Alert ID:           102854
SUN bug ID:             6505096


Vendor communication:

2006/12/10              Initial notification of the Sun Security
Coordination
                        Team.
2006/12/15              Sending reminder.
2006/12/15              Sun provides feedback about the further procedure.
2006/12/23              Sun confirms vulnerability and assigns bug ID.
2007/02/06              Requesting update.
2007/02/07              Sun provides feedback.
                        Fix for the most recent version ready.
2007/02/14              Sun informs n.runs that the fix for Sun Java Web
                        Console 2.2.4 has been approved and will soon be
                        integrated. Fixes were identified for all other
                        vulnerable versions.
2007/03/05              Requesting update.
2007/03/07              Sun awaits patch generation and the start of
                        testing cycles.
2007/03/20              Sun informs n.runs that patches will be released for
                        Solaris 10. Unbundled versions have to be upgraded
to
                        version 2.2.6.
2007/03/25              Requesting Sun Alert draft.
2007/03/31              Sun sends draft of Sun Alert. Patches have been
                        completed and the upgrade release is in work.
2007/04/14              Sun sents public disclosure date.


Systems Affected:

According to the Sun Security Coordination Team, Solaris 10 Operating
System,
Sun Java Web Console 2.2.2, Sun Java Web Console 2.2.3, Sun Java Web Console
2.2.4 and Sun Java Web Console 2.2.5 are affected.

The existence of the vulnerability was verified by n.runs on fully-patched
installations of Solaris 10 6/06 on SPARC and x86 Platform running Sun Java
Web Console 2.2.4. 


Overview:

A remote exploitable format string vulnerability has been identified in the
in
the Sun Java Web Console [1].


Description:

The Sun Java Web Console is vulnerable to a format string vulnerability.
The root cause of the format string vulnerability lies in the logging of
failed
logins, therefore this vulnerability is exploitable by unauthenticated
remote
users.

The vulnerability exists as the libc syslog function is called in
/usr/lib/libwebconsole_services.so with two (2) instead of at least three
(3)
arguments which enables an attacker to influence the message buffer.


Impact:

The exploitation of this vulnerability may result in unauthorised remote
code
execution or cause a denial of service condition by crashing the Java Web
Console service.


Solution:

Update to Sun Java Web Console 2.2.6 or later.
Patches for Solaris 10 were released by SUN Microsystems to address this
issue,
a workaround designed by Sun Microsystems is available. [2]


Credit: 

Vulnerability found by Frank Dick of n.runs AG.
Additional credits to Felix Lindner of Sabre Labs GmbH for supporting the
vulnerability research.


References:

[1] http://docs.sun.com/app/docs/doc/817-1985/6mhm8o5kh?a=view
[2] http://sunsolve.sun.com/search/document.do?assetkey=1-26-102854-1
____________________________________________________________________________
___

Unaltered electronic reproduction of this advisory is permitted. For all
other
reproduction or publication, in printing or otherwise, contact
security@...ns.com for permission.
Use of the advisory constitutes acceptance for use in an "as is" condition.
All warranties are excluded. In no event shall n.runs be liable for any
damages
whatsoever including direct, indirect, incidental, consequential, loss of
business profits or special damages, even if n.runs has been advised of the
possibility of such damages.

Copyright 2007 n.runs AG. All rights reserved. Terms of apply.


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ