‘Sun Microsystems Directory Server Enterprise ASN.1 Parsing Remote Code Execution Vulnerability’

Summary

This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Sun Microsystems Directory Service Manager.’

Credit:

‘The original article can be found at: http://www.zerodayinitiative.com/advisories/ZDI-10-074


Details

Vulnerable Systems:
 * Sun Microsystems Directory Server

Authentication is not required to exploit this vulnerability. The specific flaw exists within Sun Directory Server’s LDAP implementation and can be triggered via a malformed LDAP query to the service. When the service decodes the malformed query, the application will cause a buffer overflow which can lead to code execution under the context of the service.

Patch Availability:
Sun Microsystems has issued an update to correct this vulnerability. More details can be found at:
http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuapr2010.html

CVE Information:
CVE-2010-0897

Disclosure Timeline:
2009-10-27 – Vulnerability reported to vendor
2010-04-13 – Coordinated public release of advisory’

Categories: UNIX