Overview
A vulnerability in the way Sun Java System Web Proxy Server processes malformed packets may allow execution of arbitrary code.
Description
SOCKS is a network protocol that provides a framework that allows client-server applications to securely use network firewall services. A vulnerability exists in the way Sun Java System Web Proxy Server handles specially crafted SOCKS packets. According to iDefense Security Advisory 05.25.07: The problem specifically exists within the "sockd" daemon. This daemon implements SOCKS proxy support for the Web Proxy product. Attackers can cause a buffer overflow by manipulating certain bytes during protocol negotiation. |
Impact
An unauthenticated attacker on the local network may be able to execute arbitrary code with the privileges of the SOCKS server or cause a denial of service. |
Solution
Update Sun has addressed this issue in Sun Alert Notification 102927. |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This issue is addressed in Sun Alert Notification 102927. Sun credits iDefense for reporting this issue.
This document was written by Chris Taschner.
Other Information
CVE IDs: | CVE-2007-2881 |
Severity Metric: | 17.86 |
Date Public: | 2007-05-25 |
Date First Published: | 2007-05-30 |
Date Last Updated: | 2007-09-27 14:37 UTC |
Document Revision: | 11 |