search menu icon-carat-right cmu-wordmark

CERT Coordination Center


Sun Java System Web Proxy Server vulnerable to buffer overflow

Vulnerability Note VU#964401

Original Release Date: 2004-12-01 | Last Revised: 2004-12-17

Overview

Buffer overflow vulnerabilities in the Java System Web Proxy Server may allow remote attackers to execute arbitrary code or cause a denial-of-service condition.

Description

The Java System Web Proxy Server is a caching HTTP proxy server. A lack of bounds checking in the Java System Web Proxy Server may allow remotely exploitable buffer overflow to occur. Specific details are not available at this time. This vulnerability affects Java System Web Proxy Server software on all platforms.

Impact

A remote attacker may be able to execute arbitrary code with the privileges of the Java System Web Proxy Server process, or cause a denial-of-service condition.

Solution

Upgrade

These issues were fixed as of Java System Web Proxy Server 3.6 Service Pack 5.

Vendor Information

964401
Expand all

Sun Microsystems Inc.

Updated:  December 01, 2004

Status

  Vulnerable

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see tthe Sun Security Document 57606 for more details.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A

References

Credit

This vulnerability was reported in Sun Microsystems Alert 57606. Sun credits Matt Moore of Pentest Limited, for providing information regarding these issues.

This document was written by Jeff Gennari.

Other Information

CVE IDs: None
Severity Metric: 6.66
Date Public: 2004-10-29
Date First Published: 2004-12-01
Date Last Updated: 2004-12-17 13:18 UTC
Document Revision: 56

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.