Lucene search

K
zdiAnonymousZDI-10-074
HistoryApr 13, 2010 - 12:00 a.m.

Sun Microsystems Directory Server Enterprise ASN.1 Parsing Remote Code Execution Vulnerability

2010-04-1300:00:00
Anonymous
www.zerodayinitiative.com
17

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.046 Low

EPSS

Percentile

92.5%

This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Sun Microsystems Directory Service Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within Sun Directory Server’s LDAP implementation and can be triggered via a malformed LDAP query to the ns_slapd service. When the service decodes the malformed extendedRequest query containing a malformed requestValue string, the application will cause a buffer overflow which can lead to code execution under the context of the service.

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.046 Low

EPSS

Percentile

92.5%