English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 95248 CVE descriptions
and 52540 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.100567
Category:Buffer overflow
Title:Sun Java System Web Server Multiple Vulnerabilities
Summary:This host has Sun Java Web Server running which is prone to;Multiple Vulnerabilities.
Description:Summary:
This host has Sun Java Web Server running which is prone to
Multiple Vulnerabilities.

Vulnerability Insight:

- An error exists in WebDAV implementation in webservd and can be exploited
to cause Stack-based buffer overflow via long URI in an HTTP OPTIONS
request.
- An unspecified error that can be exploited to cause a heap-based buffer
overflow which allows remote attackers to discover process memory
locations and execute arbitrary code by sending a process memory address
via crafted data.
- Format string vulnerability in the WebDAV implementation in webservd that
can be exploited to cause denial of service via format string specifiers
in the encoding attribute of the XML declaration in a PROPFIND request.
- An unspecified error in admin server that can be exploited to cause
denial of service via an HTTP request that lacks a method token.

Vulnerability Impact:
Successful exploitation lets the attackers to discover process memory
locations or execute arbitrary code in the context of an affected system
or cause the application to crash via a long URI in an HTTP OPTIONS request.

Impact Level: System/Application

Affected Software/OS:
Sun Java System Web Server 7.0 Update 7 and prior.

Solution:
No solution or patch was made available for at least one year
since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective
features, remove the product or replace the product by another one.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: BugTraq ID: 37874
BugTraq ID: 37910
Common Vulnerability Exposure (CVE) ID: CVE-2010-0272
http://intevydis.com/sjws_demo.html
http://www.intevydis.com/blog/?p=102
XForce ISS Database: jsws-data-information-disclosure(55527)
http://xforce.iss.net/xforce/xfdb/55527
Common Vulnerability Exposure (CVE) ID: CVE-2010-0273
Common Vulnerability Exposure (CVE) ID: CVE-2010-0360
http://intevydis.blogspot.com/2010/01/sun-java-system-web-server-70u7-trace.html
http://intevydis.com/vd-list.shtml
Common Vulnerability Exposure (CVE) ID: CVE-2010-0361
http://intevydis.blogspot.com/2010/01/sun-java-system-web-server-70u7-webdav.html
Common Vulnerability Exposure (CVE) ID: CVE-2010-0388
http://intevydis.blogspot.com/2010/01/sun-java-system-web-server-70-webdav.html
http://www.securityfocus.com/bid/37910
XForce ISS Database: jsws-webdav-format-string(55812)
http://xforce.iss.net/xforce/xfdb/55812
Common Vulnerability Exposure (CVE) ID: CVE-2010-0389
http://intevydis.blogspot.com/2010/01/sun-java-system-web-server-70-admin.html
CopyrightThis script is Copyright (C) 2010 Greenbone Networks GmbH

This is only one of 52540 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2016 E-Soft Inc. All rights reserved.