Secunia Security Advisory - Sun has acknowledged a vulnerability in Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error in the libike library when processing IKE messages. This can be exploited to crash the in.iked process, which causes the IPSec key management services fail. The vulnerability is related to: SA17553 The vulnerability has been reported in Solaris 9 and 10 on both SPARC and x86 platforms.
85322bf197ef5bdf0e1a0296650aceb34f76d028d0adb093160824966ad60f04
TITLE:
Sun Solaris in.iked ISAKMP IKE Message Processing Denial of Service
SECUNIA ADVISORY ID:
SA17554
VERIFY ADVISORY:
http://secunia.com/advisories/17554/
CRITICAL:
Moderately critical
IMPACT:
DoS
WHERE:
>From remote
OPERATING SYSTEM:
Sun Solaris 10
http://secunia.com/product/4813/
Sun Solaris 9
http://secunia.com/product/95/
DESCRIPTION:
Sun has acknowledged a vulnerability in Solaris, which can be
exploited by malicious people to cause a DoS (Denial of Service).
The vulnerability is caused due to an error in the "libike" library
when processing IKE messages. This can be exploited to crash the
"in.iked" process, which causes the IPSec key management services
fail.
The vulnerability is related to:
SA17553
The vulnerability has been reported in Solaris 9 and 10 on both SPARC
and x86 platforms.
SOLUTION:
Preliminary T-patches are available.
http://sunsolve.sun.com/tpatches
-- SPARC Platform --
Solaris 9:
Apply T-patch T113451-10.
Solaris 10:
Apply T-patch T118371-06.
-- x86 Platform --
Solaris 9:
Apply T-patch T114435-09.
Solaris 10:
Apply T-patch T118372-06.
ORIGINAL ADVISORY:
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102040-1
OTHER REFERENCES:
SA17553:
http://secunia.com/advisories/17553/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------