Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2010.0081 Multiple security vulnerabilities in the HTTP TRACE, WebDAV and Digest Authentication Methods in the Sun Java System Web Server and Sun Java System Web Proxy Server 27 January 2010 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Sun Java System Web Server Sun Java System Web Proxy Server Publisher: Sun Microsystems Operating System: Solaris Linux variants Windows Solaris AIX Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Denial of Service -- Remote/Unauthenticated Unauthorised Access -- Remote/Unauthenticated Resolution: Patch/Upgrade Reference: ASB-2010.0023 Original Bulletin: http://sunsolve.sun.com/search/printfriendly.do?assetkey=1-66-275850-1 - --------------------------BEGIN INCLUDED TEXT-------------------- Article ID : 275850 Article Type : Sun Alert Last reviewed : 2010-01-25 Audience : PUBLIC Keywords : Copyright Notice: Copyright © 2009 Sun Microsystems, Inc. All Rights Reserved Multiple security vulnerabilities in the HTTP TRACE, WebDAV and Digest Authentication Methods in the Sun Java System Web Server and Sun Java System Web Proxy Server _________________________________________________________________ Category : Security Release Phase : Workaround Bug Id : 6916389, 6916390, 6916391, 6916392, 6917211, 6917212 Product : Sun Java System Web Server 6.1 Sun Java System Web Server 7.0 Sun Java System Web Proxy Server 4.0 Date of Workaround Release : 20-Jan-2010 Multiple security vulnerabilities in the HTTP TRACE, WebDAV and Digest Authentication methods: 1. Impact The following security vulnerabilities have been reported in the Sun Java System Web Server and the Sun Java System Web Proxy Server. BugIDs 6916389 and 6916390 describe buffer overflow and format string vulnerabilities in the WebDAV extensions to the Sun Java System Web Server. These issues may allow remote clients to trigger a Web Server crash, thus resulting in a Denial of Service (DoS) condition. These issues may also allow remote unauthorized users to gain elevated privileges, enabling them to access and modify sensitive files. BugIDs 6916391 and 6917212 describe buffer overflow issues in the Digest Authentication methods in the Sun Java System Web Server and Sun Java System Web Proxy Server, which may allow remote unprivileged users to crash the Web Server or the Web Proxy Server, thus leading to a Denial of Service (DoS) condition. These issues may also lead to execution of arbitrary code with elevated privileges. BugIDs 6916392 and 6917211 describe heap overflow issues in the HTTP TRACE functionality in the Sun Java System Web Server and Sun Java System Web Proxy Server, which may allow remote unprivileged users to crash the Web Server or the Web Proxy Server, thus leading to a Denial of Service (DoS) condition. These issues may also be exploited to gain unauthorized access to sensitive information. Sun acknowledges with thanks, Evgeny Legerov from Intevydis <www.intevydis.com> for discovering and reporting these issues. 2. Contributing Factors The issue described in BugID 6916389 can occur in the following releases for the SPARC, x86, Linux, Windows, HP-UX and AIX Platforms: * Sun Java System Web Server 7.0 without Update Release 8 The issues described in bugIDs 6916390, 6916391 and 6916392 can occur in the following releases for the SPARC, x86, Linux, Windows, HP-UX and AIX Platforms: * Sun Java System Web Server 7.0 without Update Release 8 * Sun Java System Web Server 6.1 without Service Pack 12 The issues described in bugIDs 6917211 and 6917212 can occur in the following release for the SPARC, x86, Linux, Windows and HP-UX Platforms: * Sun Java System Web Proxy Server 4.0 without Service pack 13 Note 1: HTTP TRACE, which is part of the HTTP 1.1 standard and described in RFC 2616, is enabled by default on the Web Server and Web Proxy Server. Note 2: The issues described in bugIDs 6916389 and 6916390 only affect Web Servers which have enabled the WebDAV functionality. To determine if WebDAV is enabled on a Web Server deployment, do the following: 1. Check for the following entries in magnus.conf configuration file: Init fn="load-modules" shlib="libdavplugin.so" funcs="init-dav,ntrans-dav, pcheck-dav,service-dav" Init fn="init-dav" LateInit="yes" 2. Check for the following entries in the obj.conf configuration file of the virtual server: <Object name="default"> ... NameTrans fn="ntrans-dav" name="dav" ... Service fn="service-dav" method="(OPTIONS|PUT|DELETE|COPY|MOVE|PROPFIND|PROPPATCH|LOCK|UNLOCK|MKCOL|ACL|REPORT)" ... </Object> <Object name="dav"> PathCheck fn="check-acl" acl="dav-src" Service fn="service-dav" method="(GET|HEAD|POST|PUT|DELETE|COPY|MOVE|PROPFIND|PROPPATCH|LOCK|UNLOCK|MKCOL|ACL|REPORT)" </Object> Note 3: All deployments of Web Server and Web Proxy Server are affected by the issues described in bugIDs 6916391 and 6917212, regardless of the authentication mechanism used by the Server. Note 4: To determine the version of Sun Java System Web Server 6.1 on a system, the following command can be run: $ <WS-install>/https-<host>/start -version (Where <WS-install> is the installation directory of the Web Server and <host> should be the actual host name on which the Web Server is installed). To determine the version of Sun Java System Web Server 7.0 on a system, the following command can be run: $ <WS-install>/bin/wadm --version (Where <WS-install> is the installation directory of the Web Server). To determine the version of Sun Java System Proxy Server on a system, the following command can be run: $ <PS_INSTALL>/bin/ns-proxy -v (Where <PS_INSTALL> is the installation directory of the Proxy Server). 3. Symptoms Should the described issues occur, the Web Server or the Web Proxy Server may crash, leaving the service unavailable to users for a window of time while the server automatically restarts. Depending on the system configuration, there may be a core file dumped after the service crashes. There are no predictable symptoms to indicate that these issues have been exploited to execute arbitrary code or to access unauthorized information. 4. Workaround BugIDs 6916389 and 6916390: To work around the issues described in bugIDs 6916389 and 6916390, disable WebDAV on the Web Server. WebDAV is disabled by default on the Web Server. If WebDAV has been enabled on the Server, the following steps may be used to disable the feature on Web Server 6.1: 1. Remove the following entries corresponding to WebDAV, from the virtual server's obj.conf file to disable WebDAV: <Object name="default"> ... NameTrans fn="ntrans-dav" name="dav" ... Service fn="service-dav" method="(OPTIONS|PUT|DELETE|COPY|MOVE|PROPFIND|PROPPATCH|LOCK|UNLOCK|MKCOL|ACL|REPORT)" ... </Object> <Object name="dav"> PathCheck fn="check-acl" acl="dav-src" Service fn="service-dav" method="(GET|HEAD|POST|PUT|DELETE|COPY|MOVE|PROPFIND|PROPPATCH|LOCK|UNLOCK|MKCOL|ACL|REPORT)" </Object> This step should be performed on all virtual servers on which WebDAV is enabled. 2. Remove the following entries from the file magnus.conf: Init fn="load-modules" shlib="libdavplugin.so" funcs="init-dav,ntrans-dav, pcheck-dav,service-dav" Init fn="init-dav" LateInit="yes" On Web Server 7.0, disabling of WebDAV can be done by using the following command: $<WS-install>/bin/wadm disable-webdav --user=admin --password-file=<password_file> --host=<host> --port=<port> --config=<config> Note: Restart the Web Server after disabling WebDAV. Once disabled, all legitimate uses of WebDAV will also be disabled. BugIDs 6916391 and 6917212: To workaround the issues described in bugIDs 6916391 (WebServer) and 6917212 (Proxy Server), the server must be prevented from processing Authorization headers with the Digest method. This may be accomplished in one of the following ways: 1. Filter HTTP headers containing the "Authorization: Digest" string via firewalls, load balancers or reverse proxies. Please refer to the appropriate documentation for configuring HTTP filters. 2. On Web Server 7.0, add the following rule to the file 'obj.conf' to overwrite the Authorization header containing the string "Digest": <If defined $headers{'authorization'} and $headers{'authorization'} =~ "(?i)digest"> NameTrans fn="set-variable" $headers{'authorization'} = "refuse" </If> Note: Restart the Web Server after implementing the above steps. Preventing the server from processing Digest headers will prevent all legitimate uses of the Digest Authentication. BugIDs 6916392 and 6917211: To workaround the issues described in bugs 6916392 (Web Server) and 6917211 (Proxy Server), disable HTTP TRACE support by commenting (with #) the corresponding entry in the 'obj.conf' file: # Service method="TRACE" fn="service-trace" Restart the Web Server/Web Proxy Server after editing the file. 5. Resolution These issues have been addressed in the following releases for the SPARC, x86, Linux, Windows, HP-UX and AIX Platforms: * Sun Java System Web Server 7.0 Release 8 or later Available at: https://cds.sun.com/is-bin/INTERSHOP.enfinity/WFS/CDS-CDS_SMI-Site/en_US/-/USD/ViewProductDetail-Start?ProductRef=SJWS-7.0U8-OTH-G-F@CDS-CDS_SMI * Sun Java System Web Server 6.1 Service Pack 12 or later Available at: https://cds.sun.com/is-bin/INTERSHOP.enfinity/WFS/CDS-CDS_SMI-Site/en_US/-/USD/ViewProductDetail-Start?ProductRef=SJWS-6.1-SP12-OTH-G-F@CDS-CDS_SMI A final resolution is pending completion for the Sun Java System WebProxy Server and for the Sun Java System Web Server native patches. For more information on Security Sun Alerts, see Technical Instruction ID 213557. This Sun Alert notification is being provided to you on an "AS IS" basis. This Sun Alert notification may contain information provided by third parties. The issues described in this Sun Alert notification may or may not impact your system(s). Sun makes no representations, warranties, or guarantees as to the information contained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT, ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT SUN SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. This Sun Alert notification contains Sun proprietary and confidential information. It is being provided to you pursuant to the provisions of your agreement to purchase services from Sun, or, if you do not have such an agreement, the Sun.com Terms of Use. This Sun Alert notification may only be used for the purposes contemplated by these agreements. Copyright 2000-2010 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iD8DBQFLX4UxNVH5XJJInbgRAodWAJ4pLYDEB/iWra7gAliPVB02FkQgEACeJ/WE MrBD2m3QDIIcloHgmoV9Dfo= =v4sv -----END PGP SIGNATURE-----