-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                    ESB-2009.0269 -- [Win][UNIX/Linux]
         Sun Java System Identity Manager Security Vulnerabilities
                               27 March 2009

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Sun Java System Identity Manager
Publisher:            Sun Microsystems
Operating System:     UNIX variants (UNIX, Linux, OSX)
                      Windows
Impact:               Execute Arbitrary Code/Commands
                      Increased Privileges
                      Cross-site Scripting
                      Cross-site Request Forgery
                      Inappropriate Access
                      Modify Arbitrary Files
                      Reduced Security
Access:               Remote/Unauthenticated
CVE Names:            CVE-2009-1074 CVE-2009-1075 CVE-2009-1076
                      CVE-2009-1077 CVE-2009-1078 CVE-2009-1079
                      CVE-2009-1080 CVE-2009-1081 CVE-2009-1082
                      CVE-2009-1083 CVE-2009-1084

Original Bulletin:    
  http://sunsolve.sun.com/search/printfriendly.do?assetkey=1-66-253267-1

Revision History:     March 27 2009: Added CVE References
                      March 24 2009: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

   Solution Type: Sun Alert
   Solution  253267 :   Sun Java System Identity Manager Security
   Vulnerabilities          
   Bug ID: 17763, 18052, 18104, 18578, 18946, 19033, 19115, 19595, 19659, 
   19660, 19661, 19683, 20174, 20224, 20352

   Product
   Sun Java System Identity Manager 7.0
   Sun Java System Identity Manager 7.1
   Sun Java System Identity Manager 7.1.1
   Sun Java System Identity Manager 8.0

   Date of Resolved Release: 19-Mar-2009

   SA Document Body
   Sun Java System Identity Manager Security Vulnerabilities (see below for 
   full details)

   1. Impact

   Sun Java System Identity Manager is affected by multiple security
   vulnerabilities with varying impacts, as follows:
   
   May allow a communicate between clients and the IDM server to occur
   over non-SSL secured connections, which could allow a remote 
   unprivileged user to gain unauthorized access to the data being 
   transferred(17763).

   May allow a local or remote unprivileged user to determine the existence 
   of guessed usernames without the proper authorization to do so (18052, 
   18104). Sun acknowledges with thanks, Marco Mella for bringing issue 
   18052 to our attention.

   May allow a local or remote unprivileged malicious user to compromise
   an account by changing the password without additional safeguards
   (18578).

   May allow local or remote privileged users with a restricted
   capabilities to perform actions that are expected to be restricted
   (18946).

   Cross-site Scripting (XSS) vulnerabilities may allow a local or remote
   unprivileged user the ability to execute unauthorized script code
   and related unauthorized actions in a user's browser (19033, 19595,
   19659, 19660, 19661, 19683).
   Sun acknowledges with thanks Dan Sinclair of Security Compass for
   bringing issue 19033 to our attention, and ProCheckUp Ltd for bringing
   issues 19595 and 19661 to our attention.

   May allow privileged users to submit requests bypassing normal
   validation enabling XSS, CSRF, or other attacks of those nature to the
   IDM Server. (19115).

   May allow a local or remote unprivileged/privileged user to execute
   arbitrary commands on Unix/Linux based resource adapters (20174).
   Sun acknowledges with thanks Alexandre Bezroutchko of Scanit for
   bringing this issue to our attention

   May allow a local or remote unprivileged/privileged  user to modify
   IDM system configuration data (20224).

   May allow an IDM user provisioned to an Linux/Unix resource configured
   with root access to gain additional privileges or to execute arbitrary
   code on the IDM server machine (20352).

   2. Contributing Factors

   These issues can occur in the following releases:
     * Sun Java System Identity Manager 7.0 without patch 140935-01
     * Sun Java System Identity Manager 7.1 without patch 140936-01
     * Sun Java System Identity Manager 7.1.1 without patch 137621-11
     * Sun Java System Identity Manager 8.0 without patch 139010-06

   Notes:
   Identity Manager 8.1 is not affected by these issues.
   To determine the version of Sun Java System Identity Manager installed
   on a system, log in to the administrator console using a browser and
   hover the mouse pointer over the "Help" tab in the upper right portion
   of the masthead. The current version will be displayed similar to the
   following:
          Version Sun Java System Identity Manager 7.0 (20070523)

   3. Symptoms

   There are no predictable symptoms that would indicate the described
   issues have been exploited.

   4. Workaround

   There are no workarounds for these issues.  Please see the Resolution
   section below.

   5. Resolution

   These issues are addressed in the following releases:
     * Sun Java System Identity Manager 7.0 with patch 140935-01
     * Sun Java System Identity Manager 7.1 with patch 140936-01
     * Sun Java System Identity Manager 7.1.1 with patch 137621-11
     * Sun Java System Identity Manager 8.0 with patch 139010-06

   Note: for all Identity Manager supported platforms refer to your
   installation guide. See patch README for other patch dependencies.
   For more information on Security Sun Alerts, see Technical Instruction
   ID 213557
   http://sunsolve.sun.com/search/document.do?assetkey=1-61-213557-1

   This Sun Alert notification is being provided to you on an "AS IS"
   basis. This Sun Alert notification may contain information provided by
   third parties. The issues described in this Sun Alert notification may
   or may not impact your system(s). Sun makes no representations,
   warranties, or guarantees as to the information contained herein. ANY
   AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION
   WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR
   NON-INFRINGEMENT, ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT
   YOU ACKNOWLEDGE THAT SUN SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT,
   INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE
   OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN.
   This Sun Alert notification contains Sun proprietary and confidential
   information. It is being provided to you pursuant to the provisions of
   your agreement to purchase services from Sun, or, if you do not have
   such an agreement, the Sun.com Terms of Use. This Sun Alert
   notification may only be used for the purposes contemplated by these
   agreements.
   Copyright 2000-2009 Sun Microsystems, Inc., 4150 Network Circle, Santa
   Clara, CA 95054 U.S.A. All rights reserved

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iD8DBQFJzCgONVH5XJJInbgRAiIcAKCG0ySDcc1LIrISm1OcK+0+09Xp8ACbBxLI
KF0J50I1eSNtV1Pcb3fpxGc=
=BLBK
-----END PGP SIGNATURE-----