Deprecated: The each() function is deprecated. This message will be suppressed on further calls in /home/zhenxiangba/zhenxiangba.com/public_html/phproxy-improved-master/index.php on line 456
Secunia - Advisories - Sun ONE Web Server Unspecified Buffer Overflow Vulnerability
[go: Go Back, main page]


Secunia - Stay Secure
Secunia monitors vulnerabilities in more than 7,500 products, e.g.:
Internet Explorer | Mozilla Firefox | Opera | View All Products
Home >> Secunia Advisories >> Sun ONE Web Server Unspecified Buffer Overflow Vulnerability

Secunia Advisories
Historic Advisories
Listed By Product
Listed By Vendor
Statistics
About Advisories
Secunia Research

Virus Information
Chronological List
Last 10 Virus Alerts
About Virus Info

Secunia Advisories
Weekly Summary
Secunia Virus Alerts


Sun ONE Web Server Unspecified Buffer Overflow Vulnerability

Secunia Advisory:SA10597Print Advisory  
Release Date:2004-01-12

Critical:
Moderately critical
Impact:DoS
Where:From remote
Solution Status:Vendor Patch

OS:HP-UX 10.x
HP-UX 11.x

Software:Sun Java System Web Server (Sun ONE/iPlanet) 6.x

Select a product and view a complete list of all Patched/Unpatched Secunia advisories affecting it.

Description:
Sun has reported a vulnerability in Sun ONE Web Server, which can be exploited by malicious people to cause a DoS (Denial of Service).

The vulnerability in caused due to an unspecified boundary error, which can be exploited to cause a buffer overflow.

Sun reports that successful exploitation crashes the web server.

The vulnerability affects version 6.0 with Service Pack 5 and prior on the HP-UX platform.

Solution:
Apply Service Pack 6.
http://wwws.sun.com/software/download/products/3f186391.html

Provided and/or discovered by:
Reported by vendor.

Original Advisory:
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57464


Please note: The information, which this Secunia Advisory is based upon, comes from third party unless stated otherwise.

Secunia collects, validates, and verifies all vulnerability reports issued by security research groups, vendors, and others.


Send Feedback to Secunia:

If you have new information regarding this Secunia advisory or a product in our database, please send it to us using either our web form or email us at vuln@secunia.com.

Ideas, suggestions, and other feedback is most welcome.


Found: 117 Related Secunia Security Advisories, displaying 10

- HP-UX Unspecified Privilege Escalation Vulnerability
- HP-UX ftpd Denial of Service Vulnerability
- HP-UX Secure Shell Denial of Service Vulnerability
- HP-UX Software Distributor Unauthorised Access Vulnerability
- HP-UX WBEM Services Unspecified Denial of Service Vulnerability
- HP-UX TCP/IP "Rose Attack" Denial of Service Vulnerability
- HP-UX IPsec Tunnel ESP Mode Encrypted Data Disclosure
- HP-UX Apache Multiple Vulnerabilities
- HP-UX IPSec Denial of Service and Unauthorised Access Vulnerability
- HP-UX xterm Unspecified Unauthorized Access Vulnerability

Show all related advisories


Receive all Secunia Security Advisories Free:


Read more about our mailing list.





Search



Secunia News

2006-02-10
Secunia Research reports multiple Lotus Notes and Domino vulnerabilities.

- - - - - - - - -

2005-11-21
Proof of Concept code has been released for a 6 month old Internet Explorer vulnerability. Criticality rating increased to Extremely Critical.

- - - - - - - - -

2005-06-21
Multiple browsers are vulnerable to the Dialog Origin Spoofing Vulnerability.

- - - - - - - - -

2005-04-04
Various Mozilla browsers are vulnerable to the Mozilla Arbitrary Memory Exposure Vulnerability.


Secunia Feeds

Secunia Advisories
Get the RSS feed or use our HTML version.

Secunia Virus Alerts
Get the RSS feed.

Special Requests
Special requests for your website can be sent to our support, or read more about featuring Secunia information here.


Terms & Conditions - Confidentiality - Copyright Secunia - Compliance - Contact Secunia