Note: This is an archival copy of Security Sun Alert 201011 as previously published on http://sunsolve.sun.com. Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1000763.1. |
Category Security Release Phase Resolved Sun Crypto Accelerator 4000 PCI Card Bug Id 4940538 Date of Resolved Release 01-JUN-2004 Impact Solaris 8 or Solaris 9 systems equipped with Sun Crypto Accelerator 4000 v1.0 boards which are configured to use the Apache web server may be vulnerable to Denial of Service attacks and service interruptions. In some cases a local or remote unprivileged user may be able to execute arbitrary code on the system and possibly gain elevated privileges due to buffer overflows found in OpenSSL. This issue is also described in NISCC Vulnerability Advisory #224012 at: http://www.uniras.gov.uk/vuls/2004/224012/index.htm. Also see CVE CAN-2004-0079 at: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0079, CVE CAN-2004-0112 at: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0112 and CVE CAN-2004-0081 at: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0081 for additional information. Contributing Factors This issue can occur in the following releases: SPARC Platform
Note: Sun Crypto Accelerator is not supported on the x86 platform. A system is only vulnerable to this issue if the Apache web server has been configured and is running on the system. The following command can be executed to check if the Apache(1M) httpd daemon is running on the system: $ /usr/bin/ps -ef | grep httpd nobody 103892 102307 0 Jun 20 ? 0:27 /usr/apache/bin/httpd Symptoms There are no reliable symptoms that would indicate the described issues have been exploited. Workaround There is no workaround. Please see the "Resolution" section below. Resolution This issue is addressed in the following releases: SPARC Platform
Modification History Date: 07-JUN-2004
References114796-04Attachments This solution has no attachment |
|