CERTA-2009-AVI-561
Vulnerability from certfr_avis
De multiples vulnérabilités dans Directory Server Enterprise Edition permettent de réaliser un déni de service à distance ou de bénéficier des privilèges d'un autre utilisateur.
Description
De multiples vulnérabilités ont été découvertes dans Directory Server Enterprise Edition versions 6.x :
- sous certaines conditions, l'opération d'un client peut être exécutée avec les privilèges d'un autre client ;
- en envoyant des paquets spécifiquement constitués, il est possible d'empêcher le serveur de répondre aux nouvelles connexions ;
- en utilisant un client psearch spécifique, il est possible d'empêcher le serveur d'envoyer des réponses aux autres clients psearch.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | Sun Java System Directory Server Enterprise Edition version 6.3 ; | ||
| N/A | N/A | Sun Java System Directory Server Enterprise Edition version 6.0 ; | ||
| N/A | N/A | Sun Java System Directory Server Enterprise Edition version 6.1 ; | ||
| N/A | N/A | Sun Java System Directory Server Enterprise Edition version 6.3.1 sans le correctif 141958-01. | ||
| N/A | N/A | Sun Java System Directory Server Enterprise Edition version 6.2 ; |
References
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Sun Java System Directory Server Enterprise Edition version 6.3 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Sun Java System Directory Server Enterprise Edition version 6.0 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Sun Java System Directory Server Enterprise Edition version 6.1 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Sun Java System Directory Server Enterprise Edition version 6.3.1 sans le correctif 141958-01.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Sun Java System Directory Server Enterprise Edition version 6.2 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Directory Server\nEnterprise Edition versions 6.x :\n\n- sous certaines conditions, l\u0027op\u00e9ration d\u0027un client peut \u00eatre\n ex\u00e9cut\u00e9e avec les privil\u00e8ges d\u0027un autre client ;\n- en envoyant des paquets sp\u00e9cifiquement constitu\u00e9s, il est possible\n d\u0027emp\u00eacher le serveur de r\u00e9pondre aux nouvelles connexions ;\n- en utilisant un client psearch sp\u00e9cifique, il est possible\n d\u0027emp\u00eacher le serveur d\u0027envoyer des r\u00e9ponses aux autres clients\n psearch.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [],
"initial_release_date": "2009-12-29T00:00:00",
"last_revision_date": "2009-12-29T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Sun Solaris #270789 du 23 d\u00e9cembre 2009 :",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270789-1"
}
],
"reference": "CERTA-2009-AVI-561",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-12-29T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s dans \u003cspan class=\"textit\"\u003eDirectory Server\nEnterprise Edition\u003c/span\u003e permettent de r\u00e9aliser un d\u00e9ni de service \u00e0\ndistance ou de b\u00e9n\u00e9ficier des privil\u00e8ges d\u0027un autre utilisateur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Directory Server Enterprise Edition",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Sun Solaris #270789 du 23 d\u00e9cembre 2009",
"url": null
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…