‘Sun Microsystems Directory Server DSML over HTTP Username Search DoS Vulnerability’
‘The original article can be found at: http://www.zerodayinitiative.com/advisories/ZDI-10-073‘
* Sun Microsystems Directory Server
Authentication is not required to exploit this vulnerability. The specific flaw exists within Sun Directory Server’s DSML-over-HTTP implementation and can be triggered via an HTTP POST request to the webserver that the application has bound to. When the service processes a search request with a malformed username, the application will dereference a null pointer causing any future queries made against the webserver to fail. This will lead to a denial of service against the affected service.
Sun Microsystems has issued an update to correct this vulnerability. More details can be found at:
2009-10-27 – Vulnerability reported to vendor
2010-04-13 – Coordinated public release of advisory’