Date: 04 May 2007
References: ASB-2012.0006
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2007.0196 -- [Win][RedHat][HP-UX][Solaris][AIX]
The Directory Server ("ns-slapd") May Exit Unexpectedly When
Handling Certain Queries
4 May 2007
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Sun Java System Directory Server 5.1, 5.2
Sun Java System Directory Server Enterprise Edition
Publisher: Sun Microsystems
Operating System: AIX
HP-UX
Red Hat Enterprise Linux 2
Solaris
Windows
Impact: Denial of Service
Access: Remote/Unauthenticated
CVE Names: CVE-2006-4175
Revision History: May 4 2007: Resolution Section of Advisory Updated
March 26 2007: Initial Release
- --------------------------BEGIN INCLUDED TEXT--------------------
Sun(sm) Alert Notification
* Sun Alert ID: 102853
* Synopsis: The Directory Server ("ns-slapd") May Exit Unexpectedly
When Handling Certain Queries
* Category: Security
* Product: Sun Java System Directory Server 5.1 Service Pack 3, Sun
Java System Directory Server 5.2, Sun Java System Directory Server
Enterprise Edition
* BugIDs: 6462036
* Avoidance: Patch
* State: Resolved
* Date Released: 23-Mar-2007, 03-May-2007
* Date Closed: 03-May-2007
* Date Modified: 30-Apr-2007, 03-May-2007
1. Impact
The Directory Server process "ns-slapd" may be terminated by a local
or remote unprivileged user. This would cause a Denial of Service
(DoS) to directory server services hosted on the affected system.
Sun acknowledges with thanks, iDefense (http://www.idefense.com),
for bringing this issue to our attention.
This issue is also described in the following document:
* http://labs.idefense.com/intelligence/vulnerabilities/display.p
hp?id=491
2. Contributing Factors
This issue can occur in the following releases for all platforms
(Solaris 8, 9, and 10 on Solaris SPARC and Solaris x86 Platforms,
Linux, Windows, HP-UX, and AIX):
Native Package Versions:
* Sun ONE Directory Server 5.2
* Sun Java System Directory Server 5 2003Q4 (5.2patch1)
* Sun Java System Directory Server 5 2004Q2 (5.2patch2)
* Sun Java System Directory Server 5 2005Q1 (5.2patch3)
* Sun Java System Directory Server 5 2005Q4 (5.2patch4)
PatchZIP (Compressed Archive) versions:
* Sun ONE Directory Server 5.1
* Sun One Directory Server 5.2
* Sun Java System Directory Server 5.2 Patch2
* Sun Java System Directory Server 5.2 Patch3
* Sun Java System Directory Server 5.2 Patch4
3. Symptoms
If the described issue occurs, the Directory Server exits unexpectedly
at the second request and a message similar to the following is logged
for the first request:
[10/Oct/2006:10:32:10 +0200] conn=0 op=0 msgId=1 - ber decoding error (op=C
ompare; params=DN,Type,Value)
[10/Oct/2006:10:32:10 +0200] conn=0 op=0 msgId=1 - RESULT err=2 tag=111 nen
tries=0 etime=0
4. Relief/Workaround
There is no workaround for this issue.
To recover from an unresponsive LDAP server instance, the following
command can be used to restart the LDAP server process:
On UNIX systems (usually as root user):
# <server instance path>/start-slapd
On Windows systems, open the "Services" panel and start the service
manually.
5. Resolution
This issue is addressed in Sun Java System Directory Server 5.2
Patch5. To upgrade to Directory Server 5.2patch5, apply the following
patches:
For the Native Package Versions:
* Solaris Sparc: 115614-27
* Solaris x86: 115615-27
* Linux: 118080-12
* HP-UX : 121393-02
* Windows: 121392-03
For the PatchZIP (Compressed Archive) versions:
* Solaris Sparc: 117665-04
* Solaris x86: 117666-04
* Linux: 117668-04
* Windows: 117667-04
* HP-UX: 117669-04
* AIX: 117670-04
Change History
30-Apr-2007:
* Updated Resolution section
03-May-2007:
* State: Resolved
* Updated Resolution section
This Sun Alert notification is being provided to you on an "AS IS"
basis. This Sun Alert notification may contain information provided by
third parties. The issues described in this Sun Alert notification may
or may not impact your system(s). Sun makes no representations,
warranties, or guarantees as to the information contained herein. ANY
AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR
NON-INFRINGEMENT, ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT
YOU ACKNOWLEDGE THAT SUN SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE
OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN.
This Sun Alert notification contains Sun proprietary and confidential
information. It is being provided to you pursuant to the provisions of
your agreement to purchase services from Sun, or, if you do not have
such an agreement, the Sun.com Terms of Use. This Sun Alert
notification may only be used for the purposes contemplated by these
agreements.
Copyright 2000-2006 Sun Microsystems, Inc., 4150 Network Circle, Santa
Clara, CA 95054 U.S.A. All rights reserved
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/render.html?cid=1980
If you believe that your computer system has been compromised or attacked in
any way, we encourage you to let us know by completing the secure National IT
Incident Reporting Form at:
http://www.auscert.org.au/render.html?it=3192
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iQCVAwUBRjq5iCh9+71yA2DNAQIHFgP/SbUGM9VrgX3MP4paojdfQolSEs1EdSoF
JLLUQkpB43DDqtbltP+SPvwTP1ZPA+aUEji4zJKb5pJgckcwuKNBDX1BUz13KqN4
IFx30AfrZwlOJJpuOTiGZckJJayHtT3h9aUS4G9obAgx8oQtRnRk44OWhpt/WKqi
9tFQkR9Gmwg=
=bG5M
-----END PGP SIGNATURE-----
|