CERTA-2009-AVI-561

Vulnerability from certfr_avis - Published: 2009-12-29 - Updated: 2009-12-29

De multiples vulnérabilités dans Directory Server Enterprise Edition permettent de réaliser un déni de service à distance ou de bénéficier des privilèges d'un autre utilisateur.

Description

De multiples vulnérabilités ont été découvertes dans Directory Server Enterprise Edition versions 6.x :

  • sous certaines conditions, l'opération d'un client peut être exécutée avec les privilèges d'un autre client ;
  • en envoyant des paquets spécifiquement constitués, il est possible d'empêcher le serveur de répondre aux nouvelles connexions ;
  • en utilisant un client psearch spécifique, il est possible d'empêcher le serveur d'envoyer des réponses aux autres clients psearch.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
N/A N/A Sun Java System Directory Server Enterprise Edition version 6.3 ;
N/A N/A Sun Java System Directory Server Enterprise Edition version 6.0 ;
N/A N/A Sun Java System Directory Server Enterprise Edition version 6.1 ;
N/A N/A Sun Java System Directory Server Enterprise Edition version 6.3.1 sans le correctif 141958-01.
N/A N/A Sun Java System Directory Server Enterprise Edition version 6.2 ;

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Sun Java System Directory Server Enterprise Edition version 6.3 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Sun Java System Directory Server Enterprise Edition version 6.0 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Sun Java System Directory Server Enterprise Edition version 6.1 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Sun Java System Directory Server Enterprise Edition version 6.3.1 sans le correctif 141958-01.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Sun Java System Directory Server Enterprise Edition version 6.2 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Directory Server\nEnterprise Edition versions 6.x :\n\n-   sous certaines conditions, l\u0027op\u00e9ration d\u0027un client peut \u00eatre\n    ex\u00e9cut\u00e9e avec les privil\u00e8ges d\u0027un autre client ;\n-   en envoyant des paquets sp\u00e9cifiquement constitu\u00e9s, il est possible\n    d\u0027emp\u00eacher le serveur de r\u00e9pondre aux nouvelles connexions ;\n-   en utilisant un client psearch sp\u00e9cifique, il est possible\n    d\u0027emp\u00eacher le serveur d\u0027envoyer des r\u00e9ponses aux autres clients\n    psearch.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [],
  "initial_release_date": "2009-12-29T00:00:00",
  "last_revision_date": "2009-12-29T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Sun Solaris #270789 du 23 d\u00e9cembre    2009 :",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270789-1"
    }
  ],
  "reference": "CERTA-2009-AVI-561",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2009-12-29T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s dans \u003cspan class=\"textit\"\u003eDirectory Server\nEnterprise Edition\u003c/span\u003e permettent de r\u00e9aliser un d\u00e9ni de service \u00e0\ndistance ou de b\u00e9n\u00e9ficier des privil\u00e8ges d\u0027un autre utilisateur.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Directory Server Enterprise Edition",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Sun Solaris #270789 du 23 d\u00e9cembre 2009",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…