|
|
|
|
| |
Credit:
The original article can be found at: http://www.zerodayinitiative.com/advisories/ZDI-10-075
|
| |
Vulnerable Systems:
* Sun Microsystems Directory Server
Authentication is not required to exploit this vulnerability. The specific flaw exists within Sun Directory Server's DSML-over-HTTP implementation and can be triggered via an HTTP POST request to the webserver that the application has bound to. When the service processes an XML request containing specific UTF-8 characters, an underlying library will raise an exception that is uncaught by the application. Due to the exception being uncaught, the application will then terminate which will cause future requests made against the service to fail. This will lead to a denial of service against the affected application.
Patch Availability:
Sun Microsystems has issued an update to correct this vulnerability. More details can be found at:
http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuapr2010.html
CVE Information:
CVE-2010-0897
Disclosure Timeline:
2009-10-27 - Vulnerability reported to vendor
2010-04-13 - Coordinated public release of advisory
|
|
|
|
|