‘Sun Microsystems Directory Server DSML over HTTP Username Search DoS Vulnerability’


This vulnerability allows attackers to deny services on vulnerable installations of Sun Microsystems Directory Service Manager.’


‘The original article can be found at: http://www.zerodayinitiative.com/advisories/ZDI-10-073


Vulnerable Systems:
 * Sun Microsystems Directory Server

Authentication is not required to exploit this vulnerability. The specific flaw exists within Sun Directory Server’s DSML-over-HTTP implementation and can be triggered via an HTTP POST request to the webserver that the application has bound to. When the service processes a search request with a malformed username, the application will dereference a null pointer causing any future queries made against the webserver to fail. This will lead to a denial of service against the affected service.

Patch Availability:
Sun Microsystems has issued an update to correct this vulnerability. More details can be found at:

CVE Information:

Disclosure Timeline:
2009-10-27 – Vulnerability reported to vendor
2010-04-13 – Coordinated public release of advisory’

Categories: News