Secunia Security Advisory - Sun Microsystems has acknowledged a vulnerability in Solaris and JDS (Sun Java Desktop System), which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.
991867f80918678866119b92bdb04e8cff918662169a1ca616143506f4602f20
TITLE:
Sun Solaris/JDS libexif EXIF Tag Structure Validation Vulnerability
SECUNIA ADVISORY ID:
SA17705
VERIFY ADVISORY:
http://secunia.com/advisories/17705/
CRITICAL:
Moderately critical
IMPACT:
System access, DoS
WHERE:
>From remote
OPERATING SYSTEM:
Sun Solaris 10
http://secunia.com/product/4813/
SOFTWARE:
Sun Java Desktop System (JDS) Release 2
http://secunia.com/product/5797/
DESCRIPTION:
Sun Microsystems has acknowledged a vulnerability in Solaris and JDS
(Sun Java Desktop System), which can be exploited by malicious people
to cause a DoS (Denial of Service) or potentially compromise a
vulnerable system.
For more information:
SA14504
The vulnerability has been reported in the following versions:
* Solaris 10 Operating System (SPARC and x86)
* Sun Java Desktop System Release 2 (for Solaris 9 on x86)
* Sun Java Desktop System Release 2 without the updated RPMs.
(Linux)
* Sun Java Desktop System 2003 (Linux)
SOLUTION:
Apply patches.
-- SPARC Platform --
Solaris 10:
Apply patch 121095-01 or later.
http://sunsolve.sun.com/search/document.do?assetkey=urn:cds:docid:1-21-121095-01-1
-- x86 Platform --
Solaris 10:
Apply patch 121096-01 or later.
http://sunsolve.sun.com/search/document.do?assetkey=urn:cds:docid:1-21-121096-01-1
Java Desktop System (JDS) Release 2 (for Solaris 9):
Apply patch 121093-01 or later.
http://sunsolve.sun.com/search/document.do?assetkey=urn:cds:docid:1-21-121093-01-1
ORIGINAL ADVISORY:
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102041-1
OTHER REFERENCES:
SA14504:
http://secunia.com/advisories/14504/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------