Vulnerabilities > CVE-2007-1681 - Unspecified vulnerability in SUN Java web Console and Solaris

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
sun
nessus

Summary

Format string vulnerability in libwebconsole_services.so in Sun Java Web Console 2.2.2 through 2.2.5 allows remote attackers to cause a denial of service (application crash), obtain sensitive information, and possibly execute arbitrary code via unspecified vectors during a failed login attempt, related to syslog. Root level code execution is only possible if the web console is running as root, which it does not by default. The vendor has addressed this issue through multiple product updates: Sun Java Web Console 2.2.2 http://www.sun.com/download/products.xml?id=461d58be Sun Java Web Console x86 2.2.2 http://www.sun.com/download/products.xml?id=461d58be Sun Java Web Console x86 2.2.3 http://www.sun.com/download/products.xml?id=461d58be Sun Java Web Console 2.2.3 http://www.sun.com/download/products.xml?id=461d58be Sun Java Web Console x86 2.2.4 http://www.sun.com/download/products.xml?id=461d58be Sun Java Web Console 2.2.4 http://www.sun.com/download/products.xml?id=461d58be Sun Java Web Console x86 2.2.5 http://www.sun.com/download/products.xml?id=461d58be Sun Java Web Console 2.2.5 http://www.sun.com/download/products.xml?id=461d58be

Nessus

  • NASL familySolaris Local Security Checks
    NASL idSOLARIS10_X86_121212-02.NASL
    descriptionSunOS 5.10_x86: Sun Java Web Console (Lockhart) Patch. Date this patch was last updated by Sun : Apr/16/07
    last seen2020-06-01
    modified2020-06-02
    plugin id107876
    published2018-03-12
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/107876
    titleSolaris 10 (x86) : 121212-02
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text in this plugin was
    # extracted from the Oracle SunOS Patch Updates.
    #
    include("compat.inc");
    
    if (description)
    {
      script_id(107876);
      script_version("1.6");
      script_cvs_date("Date: 2019/10/25 13:36:24");
    
      script_cve_id("CVE-2007-1681");
    
      script_name(english:"Solaris 10 (x86) : 121212-02");
      script_summary(english:"Check for patch 121212-02");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote host is missing Sun Security Patch number 121212-02"
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "SunOS 5.10_x86: Sun Java Web Console (Lockhart) Patch.
    Date this patch was last updated by Sun : Apr/16/07"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://download.oracle.com/sunalerts/1001060.1.html"
      );
      script_set_attribute(attribute:"solution", value:"Install patch 121212-02");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:solaris:10:121212");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:solaris:10");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2007/04/16");
      script_set_attribute(attribute:"plugin_publication_date", value:"2018/03/12");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Solaris Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Solaris/showrev");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("solaris.inc");
    
    showrev = get_kb_item("Host/Solaris/showrev");
    if (empty_or_null(showrev)) audit(AUDIT_OS_NOT, "Solaris");
    os_ver = pregmatch(pattern:"Release: (\d+.(\d+))", string:showrev);
    if (empty_or_null(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Solaris");
    full_ver = os_ver[1];
    os_level = os_ver[2];
    if (full_ver != "5.10") audit(AUDIT_OS_NOT, "Solaris 10", "Solaris " + os_level);
    package_arch = pregmatch(pattern:"Application architecture: (\w+)", string:showrev);
    if (empty_or_null(package_arch)) audit(AUDIT_UNKNOWN_ARCH);
    package_arch = package_arch[1];
    if (package_arch != "i386") audit(AUDIT_ARCH_NOT, "i386", package_arch);
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"121212-02", obsoleted_by:"", package:"SUNWmcon", version:"2.2.2,REV=2005.01.09.21.19") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"121212-02", obsoleted_by:"", package:"SUNWmcos", version:"2.2.2,REV=2005.01.09.21.19") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"121212-02", obsoleted_by:"", package:"SUNWmcosx", version:"2.2.2,REV=2005.01.09.21.19") < 0) flag++;
    if (solaris_check_patch(release:"5.10_x86", arch:"i386", patch:"121212-02", obsoleted_by:"", package:"SUNWmctag", version:"2.2.2,REV=2005.01.09.21.19") < 0) flag++;
    
    if (flag) {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_HOLE,
        extra      : solaris_get_report()
      );
    } else {
      patch_fix = solaris_patch_fix_get();
      if (!empty_or_null(patch_fix)) audit(AUDIT_PATCH_INSTALLED, patch_fix, "Solaris 10");
      tested = solaris_pkg_tests_get();
      if (!empty_or_null(tested)) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      audit(AUDIT_PACKAGE_NOT_INSTALLED, "SUNWmcon / SUNWmcos / SUNWmcosx / SUNWmctag");
    }
    
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS10_X86_121212.NASL
    descriptionSunOS 5.10_x86: Sun Java Web Console (Lockhart) Patch. Date this patch was last updated by Sun : Apr/16/07 This plugin has been deprecated and either replaced with individual 121212 patch-revision plugins, or deemed non-security related.
    last seen2019-02-21
    modified2018-07-30
    plugin id25072
    published2007-04-19
    reporterTenable
    sourcehttps://www.tenable.com/plugins/index.php?view=single&id=25072
    titleSolaris 10 (x86) : 121212-02 (deprecated)
    code
    #%NASL_MIN_LEVEL 80502
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # @DEPRECATED@
    #
    # Disabled on 2018/03/12. Deprecated and either replaced by
    # individual patch-revision plugins, or has been deemed a
    # non-security advisory.
    #
    include("compat.inc");
    
    if (description)
    {
      script_id(25072);
      script_version("1.20");
      script_cvs_date("Date: 2019/10/25 13:36:24");
    
      script_cve_id("CVE-2007-1681");
    
      script_name(english:"Solaris 10 (x86) : 121212-02 (deprecated)");
      script_summary(english:"Check for patch 121212-02");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"This plugin has been deprecated."
      );
      script_set_attribute(
        attribute:"description",
        value:
    "SunOS 5.10_x86: Sun Java Web Console (Lockhart) Patch.
    Date this patch was last updated by Sun : Apr/16/07
    
    This plugin has been deprecated and either replaced with individual
    121212 patch-revision plugins, or deemed non-security related."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://download.oracle.com/sunalerts/1001060.1.html"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"n/a"
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:sun:solaris");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2007/04/16");
      script_set_attribute(attribute:"plugin_publication_date", value:"2007/04/19");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2007-2019 Tenable Network Security, Inc.");
      script_family(english:"Solaris Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Solaris/showrev");
    
      exit(0);
    }
    
    exit(0, "This plugin has been deprecated. Consult specific patch-revision plugins for patch 121212 instead.");
    
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS10_121211-02.NASL
    descriptionSunOS 5.10: Sun Java Web Console (Lockhart) Patch. Date this patch was last updated by Sun : Apr/16/07
    last seen2020-06-01
    modified2020-06-02
    plugin id107375
    published2018-03-12
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/107375
    titleSolaris 10 (sparc) : 121211-02
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS10_121211.NASL
    descriptionSunOS 5.10: Sun Java Web Console (Lockhart) Patch. Date this patch was last updated by Sun : Apr/16/07 This plugin has been deprecated and either replaced with individual 121211 patch-revision plugins, or deemed non-security related.
    last seen2019-02-21
    modified2018-07-30
    plugin id25070
    published2007-04-19
    reporterTenable
    sourcehttps://www.tenable.com/plugins/index.php?view=single&id=25070
    titleSolaris 10 (sparc) : 121211-02 (deprecated)
  • NASL familyWeb Servers
    NASL idSUN_JAVA_WEB_CONSOLE_FORMAT_STRING.NASL
    descriptionThe remote host is running SUN Java Web Console. The remote version of this service does not properly sanitize calls to the syslog function. By sending a specially crafted request it is possible to exploit this format string error. An attacker can exploit it to execute code with the privileges of the web server.
    last seen2020-06-01
    modified2020-06-02
    plugin id25082
    published2007-04-23
    reporterThis script is Copyright (C) 2007-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/25082
    titleSun Java Web Console LibWebconsole_Services.SO Remote Format String

Oval

accepted2009-08-10T04:00:02.535-04:00
classvulnerability
contributors
  • namePai Peng
    organizationOpsware, Inc.
  • namePai Peng
    organizationHewlett-Packard
descriptionFormat string vulnerability in libwebconsole_services.so in Sun Java Web Console 2.2.2 through 2.2.5 allows remote attackers to cause a denial of service (application crash), obtain sensitive information, and possibly execute arbitrary code via unspecified vectors during a failed login attempt, related to syslog.
familyunix
idoval:org.mitre.oval:def:1252
statusaccepted
submitted2007-06-15T09:00:00.000-04:00
titleFormat string vulnerability in Sun Java Web Console
version36