Security firm finds hole in Sun One

News

Security firm finds hole in Sun One

Security specialist @Stake has said that a module that ships with Sun Microsystems's One Application Server has a flaw which could be exploited by outside attackers and could give them control of the running web server.

The flaw is in the Connector Module, a Netscape Server Application Programming Interface (NSAPI) plug-in that integrates the Sun One Web Server with the Application Server.

An overly long URI (Uniform Resource Indicator) in an incoming HTTP (Hypertext Transfer Protocol) request handled by the module could cause a stack buffer overflow, @Stake said in an advisory note.

The flaw affects Sun One Application Server 6.0 and Sun One Application Server 6.5. A patch is available for version 6.5 at http://wwws.sun.com/software/download/products/3e3afb89.html.

No patch is available for version 6.0, according to @Stake, but there are a number of workarounds.

These include:

  • writing an NSAPI module to inspect the length of HTTP request URIs;
  • terminating the SSL (Secure Sockets Layer) session on a device before the Sun ONE Web server and installing an Intrusion Detection System (IDS) sensor to monitor the clear-text traffic;
  • terminating the SSL session on a reverse proxy that performs data validation on all HTTP request headers.

Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
 

COMMENTS powered by Disqus  //  Commenting policy