search menu icon-carat-right cmu-wordmark

CERT Coordination Center


Sun iPlanet and ONE Web Servers contain a buffer overflow in the search engine

Vulnerability Note VU#612843

Original Release Date: 2002-07-23 | Last Revised: 2003-04-11

Overview

The Sun iPlanet Web Server and Sun ONE Web Server both ship with a search engine that is not enabled by default. A remotely exploitable buffer overflow exists in the search engine that could permit an attacker to execute arbitrary code on the system.

Description

The Sun iPlanet Web Server Enterprise Edition 4.1 and Sun ONE Web Server 6.0 ship with a search engine that contains a buffer overflow. The search engine is not enabled by default, but is a likely configuration option that would be enabled by the site administrator. If the search engine is enabled, then a remote attacker may be able to exploit the buffer overflow to execute arbitrary code on the system.

Impact

If the search engine is enabled, then a remote attacker may be able to exploit the buffer overflow to execute arbitrary code on the system.

Solution

Sun Microsystems has released the following service packs to address this issue:

Sun iPlanet Web Server Enterprise Edition 4.1 (Service Pack 10):

Sun ONE Web Server 6.0 (Service Pack 3):

Disable the search engine.

Vendor Information

612843
Expand all

Sun Microsystems Inc.

Notified:  July 23, 2002 Updated:  July 23, 2002

Status

  Vulnerable

Vendor Statement

Sun can confirm that this issue affects the Sun(TM) ONE / iPlanet Web Server, versions 4.1 and 6.0. The vulnerability is addressed in the Sun(TM) ONE Web Server 4.1 Service Pack 10 and 6.0 Service Pack 3, both of which are available from:

http://wwws.sun.com/software/download/download/

Sun recommends affected customers download the relevant Service Pack listed above.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A

References

Credit

The CERT/CC thanks NGSSoftware for reporting this vulnerability.

This document was written by Jason A Rafail.

Other Information

CVE IDs: None
Severity Metric: 57.71
Date Public: 2002-05-27
Date First Published: 2002-07-23
Date Last Updated: 2003-04-11 22:33 UTC
Document Revision: 15

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.