‘Sun Microsystems Directory Server DSML over HTTP Username Search DoS Vulnerability’

Summary

This vulnerability allows attackers to deny services on vulnerable installations of Sun Microsystems Directory Service Manager.’

Credit:

‘The original article can be found at: http://www.zerodayinitiative.com/advisories/ZDI-10-073


Details

Vulnerable Systems:
 * Sun Microsystems Directory Server

Authentication is not required to exploit this vulnerability. The specific flaw exists within Sun Directory Server’s DSML-over-HTTP implementation and can be triggered via an HTTP POST request to the webserver that the application has bound to. When the service processes a search request with a malformed username, the application will dereference a null pointer causing any future queries made against the webserver to fail. This will lead to a denial of service against the affected service.

Patch Availability:
Sun Microsystems has issued an update to correct this vulnerability. More details can be found at:
http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuapr2010.html

CVE Information:
CVE-2010-0897

Disclosure Timeline:
2009-10-27 – Vulnerability reported to vendor
2010-04-13 – Coordinated public release of advisory’

Categories: News