---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,700 different Windows applications. Request your account, the Secunia Network Software Inspector (NSI): http://secunia.com/network_software_inspector/ ---------------------------------------------------------------------- TITLE: Sun StorageTek 3510 FC Array FTP Denial of Service SECUNIA ADVISORY ID: SA27201 VERIFY ADVISORY: http://secunia.com/advisories/27201/ CRITICAL: Not critical IMPACT: DoS WHERE: >From local network OPERATING SYSTEM: Sun StorageTek 3510 FC Array http://secunia.com/product/16137/ DESCRIPTION: Sun has acknowledged a vulnerability in Sun StorageTek 3510 FC Array, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an unspecified error within the FTP service, which can be exploited to render the array unresponsive to data services. Successful exploitation requires that the attacker has access to the management network to which the array's management Ethernet interface is connected to. The vulnerability is reported in firmware versions prior to 4.21. SOLUTION: Update to firmware 4.21, delivered in patch 113723-18 or later. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://sunsolve.sun.com/search/document.do?assetkey=1-26-103106-1 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------