Note: This is an archival copy of Security Sun Alert 200958 as previously published on http://sunsolve.sun.com.|
Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1000727.1.
Solaris 9 Operating System
Date of Workaround Release
Date of Resolved Release
The Internet Key Exchange (IKE) implementation in Solaris 9 uses ASN.1 code from SSH Inc. Under certain rare conditions, it may be possible for a local or remote unprivileged user to kill the in.iked(1M) daemon, resulting in a Denial of Service (DoS), or gain unauthorized root access due to a buffer overflow in the in.iked(1M) daemon.
The issue with ASN.1 is described in CERT Vulnerability VU#104280 (see http://www.kb.cert.org/vuls/id/104280) which is referenced in CERT Advisory CA-2003-26 (see http://www.cert.org/advisories/CA-2003-26.html) and NISCC Vulnerability Advisory 006489/TLS (see http://www.uniras.gov.uk/vuls/2003/006489/tls.htm).
This issue can occur in the following releases:
Note: Solaris 7 and 8 are not affected by this issue.
There are no predictable symptoms that would indicate the described issues have been exploited.
There is no workaround. Please see the Resolution section below.
This issue is addressed in the following releases:
This solution has no attachment