Note: This is an archival copy of Security Sun Alert 201718 as previously published on http://sunsolve.sun.com.|
Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1001267.1.
Date of Resolved Release
systems equipped with Sun Crypto Accelerator 4000 v1.0 boards ...
Solaris 8 or Solaris 9 systems equipped with Sun Crypto Accelerator 4000 v1.0 boards which are configured to use the Apache web server may be vulnerable to Denial of Service attacks and service interruptions. In some cases a local or remote unprivileged user may be able to execute arbitrary code on the system and possibly gain elevated privileges due to buffer overflows found in OpenSSL.
This issue is also described in NISCC Vulnerability Advisory #224012 at: http://www.uniras.gov.uk/vuls/2004/224012/index.htm. Also see CVE CAN-2004-0079 at: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0079, CVE CAN-2004-0112 at: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0112 and CVE CAN-2004-0081 at: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0081 for additional information.
2. Contributing Factors
This issue can occur in the following releases:
Note: Sun Crypto Accelerator is not supported on the x86 platform.
A system is only vulnerable to this issue if the Apache web server has been configured and is running on the system. The following command can be executed to check if the Apache(1M) httpd daemon is running on the system:
$ /usr/bin/ps -ef | grep httpd nobody 103892 102307 0 Jun 20 ? 0:27 /usr/apache/bin/httpd
There are no reliable symptoms that would indicate the described issues have been exploited.
There is no workaround. Please see the "Resolution" section below.
This issue is addressed in the following releases:
Copyright 2000-2010 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved.
Sun Crypto Accelerator 4000 PCI Card
This solution has no attachment