Korean
<< Back
VID 23188
Severity 40
Port 6789
Protocol TCP
Class Daemon
Detailed Description The Sun Java Web Console, according to its version number, has a format string vulnerability related to syslog. Sun Java Web Console versions 2.2.2 through to 2.2.5 could allow a remote attacker to execute arbitrary code on the system, caused by a format string vulnerability related to syslog in the libwebconsole_services.so library. By sending a specially-crafted login request, a remote attacker could cause the affected application to crash or execute arbitrary code with the privileges of the web server.

* References:
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102854-1
http://www.securityfocus.com/archive/1/archive/1/466048/100/0/threaded
http://www.frsirt.com/english/advisories/2007/1443
http://www.nruns.com/security_advisory_sun_java_format_string.php
http://secunia.com/advisories/24927

* Platforms Affected:
Sun Java Web Console 2.2.2
Sun Java Web Console 2.2.3
Sun Java Web Console 2.2.4
Sun Java Web Console 2.2.5
Sun Solaris 10
Recommendation Apply the appropriate patch for your system, available from the Sun Alert ID: 102854 at http://sunsolve.sun.com/search/document.do?assetkey=1-26-102854-1

-- OR --

Update to the latest version of Sun Java Web Console (version 2.2.6 or later). Sun Java Web Console 2.2.6 can be downloaded at http://www.sun.com/download/products.xml?id=461d58be
Related URL CVE-2007-1681 (CVE)
Related URL 23539 (SecurityFocus)
Related URL 33731 (ISS)