=====================================================================
CERT-Renater
Note d'Information No. 2009/VULN343
_____________________________________________________________________
DATE : 04/09/2009
HARDWARE PLATFORM(S) : /
OPERATING SYSTEM(S) : Systems running Sun Java Web Server.
======================================================================
http://sunsolve.sun.com/search/printfriendly.do?assetkey=1-66-266429-1
______________________________________________________________________
Solution Type: Sun Alert
Solution 266429 : A Security Vulnerability in the Sun Java System
Web Server Related to Handling of Dynamic Content May Lead to
Unauthorized Information Disclosure
Bug ID: 6860680
Product:
Sun Java Web Server 6.1
Sun Java Web Server 7.0
Date of Workaround Release: 27-Aug-2009
SA Document Body
A Security Vulnerability in the Sun Java System Web Server Related to
Handling of Dynamic Content May Lead to Unauthorized Information Disclosure
1. Impact
A security vulnerability in the Sun Java System Web Server related to
handling of dynamic content may allow a remote unprivileged user to
gain access to sensitive information on a Windows system running the
Sun Java System Web Server application.
This issue is also referenced in the following document:
CVE-2009-2445 at
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2445
2. Contributing Factors
Windows Platform
* Sun Java System Web Server 6.1 without Service Pack 12
* Sun Java System Web Server 7.0 without patch 125441-17 for Update
Release 6
Note: Sun Java System Web Server 6.1 and 7.0 running on non-Windows
platforms are not impacted by this issue.
Sun Java System Web Server 7.0 Update Release 6 can be downloaded
from:
https://cds.sun.com/is-bin/INTERSHOP.enfinity/WFS/CDS-CDS_SMI-Site/en_US/-/USD/ViewProductDetail-Start?ProductRef=SJWS-7.0U6-OTH-G-F@CDS-CDS_SMI
3. Symptoms
There are no predictable symptoms to indicate that this issue has been
exploited to gain unauthorized access to information.
4. Workaround
To work around the described issue, add the following mapping to the
"config/default-web.xml" file:
jsp
*.jsp::$DATA
and then restart the Web Server by executing the following commands as
the 'root' user:
# /admin-server/bin/stopserv
# /admin-server/bin/startserv
where is the path to the Sun Java System Web Server
installation directory.
Refer to the product documentation for more information on editing the
"default-web.xml" file.
Note: This workaround is valid only for Java Server Pages (JSP). There
is no workaround to avoid this issue with other dynamic content
provided by the Web Server.Refer to the product documentation for more
information on editing the "default-web.xml" file.
5. Resolution
A final resolution is pending completion.
For more information on Security Sun Alerts, see Technical
Instruction ID 213557.
This Sun Alert notification is being provided to you on an "AS IS"
basis. This Sun Alert notification may contain information provided by
third parties. The issues described in this Sun Alert notification may
or may not impact your system(s). Sun makes no representations,
warranties, or guarantees as to the information contained herein. ANY
AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR
NON-INFRINGEMENT, ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT
YOU ACKNOWLEDGE THAT SUN SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE
OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN.
This Sun Alert notification contains Sun proprietary and confidential
information. It is being provided to you pursuant to the provisions of
your agreement to purchase services from Sun, or, if you do not have
such an agreement, the Sun.com Terms of Use. This Sun Alert
notification may only be used for the purposes contemplated by these
agreements.
Copyright 2000-2009 Sun Microsystems, Inc., 4150 Network Circle, Santa
Clara, CA 95054 U.S.A. All rights reserved
======================================================================
=========================================================
Les serveurs de référence du CERT-Renater
http://www.urec.fr/securite
http://www.cru.fr/securite
http://www.renater.fr
=========================================================
+ CERT-RENATER | tel : 01-53-94-20-44 +
+ 151 bd de l'Hopital | fax : 01-53-94-20-41 +
+ 75013 Paris | email: certsvp@renater.fr +
=========================================================