Security firm finds hole in Sun One

News

Security firm finds hole in Sun One

Security specialist @Stake has said that a module that ships with Sun Microsystems's One Application Server has a flaw which could be exploited by outside attackers and could give them control of the running web server.

The flaw is in the Connector Module, a Netscape Server Application Programming Interface (NSAPI) plug-in that integrates the Sun One Web Server with the Application Server.

An overly long URI (Uniform Resource Indicator) in an incoming HTTP (Hypertext Transfer Protocol) request handled by the module could cause a stack buffer overflow, @Stake said in an advisory note.

The flaw affects Sun One Application Server 6.0 and Sun One Application Server 6.5. A patch is available for version 6.5 at http://wwws.sun.com/software/download/products/3e3afb89.html.

No patch is available for version 6.0, according to @Stake, but there are a number of workarounds.

These include:

  • writing an NSAPI module to inspect the length of HTTP request URIs;
  • terminating the SSL (Secure Sockets Layer) session on a device before the Sun ONE Web server and installing an Intrusion Detection System (IDS) sensor to monitor the clear-text traffic;
  • terminating the SSL session on a reverse proxy that performs data validation on all HTTP request headers.

Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
 

COMMENTS powered by Disqus  //  Commenting policy