Note: This is an archival copy of Security Sun Alert 200958 as previously published on http://sunsolve.sun.com. Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1000727.1. |
Category Security Release Phase Resolved Solaris 9 Operating System Bug Id 4930399 Date of Workaround Release 13-JAN-2004 Date of Resolved Release 28-JAN-2004 Impact The Internet Key Exchange (IKE) implementation in Solaris 9 uses ASN.1 code from SSH Inc. Under certain rare conditions, it may be possible for a local or remote unprivileged user to kill the in.iked(1M) daemon, resulting in a Denial of Service (DoS), or gain unauthorized root access due to a buffer overflow in the in.iked(1M) daemon. The issue with ASN.1 is described in CERT Vulnerability VU#104280 (see http://www.kb.cert.org/vuls/id/104280) which is referenced in CERT Advisory CA-2003-26 (see http://www.cert.org/advisories/CA-2003-26.html) and NISCC Vulnerability Advisory 006489/TLS (see http://www.uniras.gov.uk/vuls/2003/006489/tls.htm). Contributing Factors This issue can occur in the following releases: SPARC Platform
x86 Platform
Note: Solaris 7 and 8 are not affected by this issue. Symptoms There are no predictable symptoms that would indicate the described issues have been exploited. Workaround There is no workaround. Please see the Resolution section below. Resolution This issue is addressed in the following releases: SPARC Platform
x86 Platform
Modification History Date: 20-JAN-2004
Date: 22-JAN-2004
Date: 28-JAN-2004
References114435-03113451-05 Attachments This solution has no attachment |
|