The Solaris Management Console (SMC) in Sun Solaris 8 and 9 generates different 404 error messages when a file does not exist versus when a file exists but is otherwise inaccessible, which could allow remote attackers to obtain sensitive information in conjunction with a directory traversal (..) attack.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://sunsolve.sun.com/search/document.do?assetkey=1-26-57559-1&searchclause=%22category:security%22%20%20111313-02 | patch vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1482 | vdb entry signature |
http://spoofed.org/files/text/solaris-smc-advisory.txt | patch |
http://www.securityfocus.com/bid/8873 | vdb entry |
http://secunia.com/advisories/11616/ | third party advisory patch vendor advisory |
http://www.derkeiler.com/Mailing-Lists/securityfocus/focus-sun/2003-10/0032.html | mailing list |
http://www.auscert.org.au/render.html?it=4105 | third party advisory patch vendor advisory |
http://www.osvdb.org/displayvuln.php?osvdb_id=6119 | vdb entry patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16146 | vdb entry |
http://www.securityfocus.com/bid/10349 | vdb entry patch |