Thread-topic: [SA24927] Sun Solaris and Java Web Console Format String Vulnerability
>
> TITLE:
> Sun Solaris and Java Web Console Format String Vulnerability
>
> SECUNIA ADVISORY ID:
> SA24927
>
> VERIFY ADVISORY:
>
>
> CRITICAL:
> Highly critical
>
> IMPACT:
> System access
>
> WHERE:
> From remote
>
> OPERATING SYSTEM:
> Sun Solaris 10
>
>
> SOFTWARE:
> Sun Java Web Console 2.x
>
>
> DESCRIPTION:
> Frank Dick has reported a vulnerability in Sun Solaris and Java Web
> Console, which potentially can be exploited by malicious people to
> compromise a vulnerable system.
>
> The vulnerability is caused due to a format string error when calling
> the "syslog()" function to log failed logins. This may be exploited to
> execute arbitrary code by logging in with specially crafted
> credentials.
>
> The vulnerability is reported in Sun Solaris 10 prior to 11/06 and
> Sun Java Web Console versions 2.2.2 through 2.2.5.
>
> SOLUTION:
> Update to Sun Java Web Console version 2.2.6 or apply patches.
>
> Sun Java Web Console 2.2.6:
>
>
> Sun Solaris 10, SPARC platform:
> Apply patch 121211-02.
>
> cid:1-21-121211-02-1
>
> Sun Solaris 10, x86 platform:
> Apply patch 121212-02.
>
> cid:1-21-121212-02-1
>
> PROVIDED AND/OR DISCOVERED BY:
> Frank Dick, n.runs AG
>
> ORIGINAL ADVISORY:
> Sun Microsystems:
>
>
> n.runs AG:
>
>