CERTA-2005-AVI-228

Vulnerability from certfr_avis - Published: 2005-06-23 - Updated: 2005-06-23

None

Description

Selon Sun, une vulnérabilité présente dans les produits de messagerie à interface web iPlanet Messaging Server et Sun One Messaging Server peut être exploitée par un utilisateur mal intentionné afin de forcer l'exécution de script sur la plate-forme client utilisant un navigateur Internet Explorer.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs.

  • iPlanet Messaging Server 5.2 (pour Solaris 2.6 à Solaris 8).
  • Sun One Messaging Server 6.2
    • Solaris 8 à Solaris 10 sur plate-forme Sparc ;
    • Solaris 9 à Solaris 10 sur plate-forme x86 ;
    • Linux RHEL 2.1 à 3.0 ;
Impacted products
Vendor Product Description
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cUL\u003e    \u003cLI\u003eiPlanet Messaging Server 5.2 (pour Solaris 2.6 \u00e0 Solaris    8).\u003c/LI\u003e    \u003cLI\u003eSun One Messaging Server 6.2      \u003cUL\u003e        \u003cLI\u003eSolaris 8 \u00e0 Solaris 10 sur plate-forme Sparc ;\u003c/LI\u003e        \u003cLI\u003eSolaris 9 \u00e0 Solaris 10 sur plate-forme x86 ;\u003c/LI\u003e        \u003cLI\u003eLinux RHEL 2.1 \u00e0 3.0 ;\u003c/LI\u003e      \u003c/UL\u003e    \u003c/LI\u003e  \u003c/UL\u003e",
  "content": "## Description\n\nSelon Sun, une vuln\u00e9rabilit\u00e9 pr\u00e9sente dans les produits de messagerie \u00e0\ninterface web iPlanet Messaging Server et Sun One Messaging Server peut\n\u00eatre exploit\u00e9e par un utilisateur mal intentionn\u00e9 afin de forcer\nl\u0027ex\u00e9cution de script sur la plate-forme client utilisant un navigateur\nInternet Explorer.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs.\n",
  "cves": [],
  "initial_release_date": "2005-06-23T00:00:00",
  "last_revision_date": "2005-06-23T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 de Sun #101770 du 17  juin 2005 :",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101770-1"
    }
  ],
  "reference": "CERTA-2005-AVI-228",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2005-06-23T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire"
    }
  ],
  "summary": null,
  "title": "Vuln\u00e9rabilit\u00e9 des produits webmail de SUN",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 de SUN",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…