Note: This is an archival copy of Security Sun Alert 234304 as previously published on
Latest version of this security advisory is available from as Sun Alert 1019072.1.
Article ID : 1019072.1
Article Type : Sun Alerts (SURE)
Last reviewed : 2010-01-24
Audience : PUBLIC
Copyright Notice: Copyright © 2010, Oracle Corporation and/or its affiliates.

Security Sun Alert Archive Reference for Year 2000


Release Phase

Security Sun Alert Archive Reference for Year 2000

1 of 3 -- Security Sun Alert Archive Reference for Year 2000
If you need additional information for any of the following
Sun Alerts please contact the Sun Alert Program Office at:
These Sun Alerts are only available upon request. They are not part
of the current collection which begins with January 1, 2003.
sadmind May Be Exploited to Gain Root Access
Sun Alert ID: 100740 (formerly 22893)
# BugIDs: 4298053
Product: Solaris 2.5 to 8
Remote attackers may exploit this vulnerability in the "sadmind" program to execute arbitrary instructions with superuser privileges, thereby compromising system security.
dlopen() in Could be Exploited to Gain Root Access
Sun Alert ID: 100744 (formerly 23056)
# BugIDs: 4334568
Product: Solaris 2.6 to 8
Users with an unprivileged account may be able to get full root access to the system.
Buffer Overflow in netpr_send_message() Might Lead to Unauthorized Root Access
Sun Alert ID: 100755 (formerly 23567)
# BugIDs: 4310991
# Product: Solaris 2.6 to 8
Unprivileged users are able to get full root access to a system.
Netscape Browser Allows Malicious Applets to Read Data From Local Files
Sun Alert ID: 100766 (formerly 23665)
# BugIDs: CERT, advisory, CA-2000-15
Product: Netscape Browser
An exploit dubbed "Brown Orifice" creates an HTTP server as a Java applet thus turning the Netscape Browser into a web server. This allows remote users to access local and networked files. These files include URLs located behind firewalls using "file://", "http://", "https://", "ftp://", and other types of connections.
The Netscape Browser is a component of both Netscape Communicator and Netscape Navigator.
For more information on the vulnerability see CERT advisory CA-2000-15 at:
Possible Security Issue in nscd because of Buffer Overflows
Sun Alert ID: 100719 (formerly 123)
# BugIDs: 4114757
Product: Solaris 2.5, 2.6
Unprivileged users may be able to get full root access to the system because of a possible buffer overflow in the nscd process.
Non-Privileged Users Can Obtain Root Access on Systems Running Sun HPC 2.0 or Sun HPC Clustertools 3.0/3.1
Sun Alert ID: 100775 (formerly 23934)
# BugIDs: 4345873
# Product: Sun HPC Clustertools 3.1
Non-Privileged users can obtain root access on systems running Sun HPC 2.0, Sun HPC Clustertools 3.0, or Sun HPC Clustertools 3.1.
Users can Bypass Being Forced to Change Their Login Password
Sun Alert ID: 100773 (formerly 23895)
# BugIDs: 4112707
Product: Solaris 2.5.1 to 8
Even though a login password has been created with the "passwd -f" command to force a user to change the password on the first login, users can circumvent this requirement and use the initially set password indefinitely.
Potential Compromise of 2 Sun Browser Certificates
Sun Alert ID: 100796 (formerly 24690)
# BugIDs: none
Product: Web browsers
Web browsers accept security certificates from trusted sources. A specific certificate from Sun may have received outside exposure.
Systems that encounter this certificate are potentially vulnerable to attack from malicious applets, applications or components.
The Java Runtime Environment Might Allow an Untrusted Java Class to Call Into a Disallowed Java Class
Sun Alert ID: 100788 (formerly 24493)
# BugIDs: 4288452
Product: JDK/JRE 1.2.2
Under certain circumstances, the Java(TM) Runtime Environment might allow an untrusted Java class to call into an otherwise disallowed Java class. This is a potential security issue.
============ End of 2000 ======================================================

Solaris 8 Operating System

This solution has no attachment