-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2010.0081
  Multiple security vulnerabilities in the HTTP TRACE, WebDAV and Digest
       Authentication Methods in the Sun Java System Web Server and
                     Sun Java System Web Proxy Server
                              27 January 2010

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Sun Java System Web Server
                   Sun Java System Web Proxy Server
Publisher:         Sun Microsystems
Operating System:  Solaris
                   Linux variants
                   Windows
                   Solaris
                   AIX
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
                   Unauthorised Access             -- Remote/Unauthenticated
Resolution:        Patch/Upgrade

Reference:         ASB-2010.0023

Original Bulletin: 
   http://sunsolve.sun.com/search/printfriendly.do?assetkey=1-66-275850-1

- --------------------------BEGIN INCLUDED TEXT--------------------

Article ID : 275850
Article Type : Sun Alert
Last reviewed : 2010-01-25
Audience : PUBLIC
Keywords :

Copyright Notice: Copyright © 2009 Sun Microsystems, Inc. All Rights
Reserved

Multiple security vulnerabilities in the HTTP TRACE, WebDAV and Digest
Authentication Methods in the Sun Java System Web Server and Sun Java
System Web Proxy Server
  _________________________________________________________________

Category : Security
Release Phase : Workaround
Bug Id : 6916389, 6916390, 6916391, 6916392, 6917211, 6917212
Product : Sun Java System Web Server 6.1
Sun Java System Web Server 7.0
Sun Java System Web Proxy Server 4.0

Date of Workaround Release : 20-Jan-2010

Multiple security vulnerabilities in the HTTP TRACE, WebDAV and Digest
Authentication methods:

1. Impact
The following security vulnerabilities have been reported in the Sun
Java System Web Server and the Sun Java System Web Proxy Server.
BugIDs 6916389 and 6916390 describe buffer overflow and format string
vulnerabilities in the WebDAV extensions to the Sun Java System Web
Server.  These issues may allow remote clients to trigger a Web Server
crash, thus resulting in a Denial of Service (DoS) condition. These
issues may also allow remote unauthorized users to gain elevated
privileges, enabling them to access and modify sensitive files.
BugIDs 6916391 and 6917212 describe buffer overflow issues in the
Digest Authentication methods in the Sun Java System Web Server and
Sun Java System Web Proxy Server, which may allow remote unprivileged
users to crash the Web Server or the Web Proxy Server, thus leading to
a Denial of Service (DoS) condition. These issues may also lead to
execution of arbitrary code with elevated privileges.
BugIDs 6916392 and 6917211 describe heap overflow issues in the HTTP
TRACE functionality in the Sun Java System Web Server and Sun Java
System Web Proxy Server, which may allow remote unprivileged users to
crash the Web Server or the Web Proxy Server, thus leading to a Denial
of Service (DoS) condition. These issues may also be exploited to gain
unauthorized access to sensitive information.
Sun acknowledges with thanks, Evgeny Legerov from Intevydis
<www.intevydis.com> for discovering and reporting these issues.

2. Contributing Factors
The issue described in BugID 6916389 can occur in the following
releases for the SPARC, x86, Linux, Windows, HP-UX and AIX Platforms:
  * Sun Java System Web Server 7.0 without Update Release 8

The issues described in bugIDs 6916390, 6916391 and 6916392 can occur
in the following releases for the SPARC, x86, Linux, Windows, HP-UX
and AIX Platforms:
  * Sun Java System Web Server 7.0 without Update Release 8
  * Sun Java System Web Server 6.1 without Service Pack 12

The issues described in bugIDs 6917211 and 6917212 can occur in the
following release for the SPARC, x86, Linux, Windows and HP-UX
Platforms:
  * Sun Java System Web Proxy Server 4.0 without Service pack 13

Note 1: HTTP TRACE, which is part of the HTTP 1.1 standard and
described in RFC 2616, is enabled by default on the Web Server and Web
Proxy Server.
Note 2: The issues described in bugIDs 6916389 and 6916390 only affect
Web Servers which have enabled the WebDAV functionality. To determine
if WebDAV is enabled on a Web Server deployment, do the following:

1. Check for the following entries in magnus.conf configuration file:
 Init fn="load-modules" shlib="libdavplugin.so" funcs="init-dav,ntrans-dav,
 pcheck-dav,service-dav"
 Init fn="init-dav" LateInit="yes"

2. Check for the following entries in the obj.conf configuration file
of the virtual server:
 <Object name="default">
 ...
 NameTrans fn="ntrans-dav" name="dav"
 ...
 Service fn="service-dav" method="(OPTIONS|PUT|DELETE|COPY|MOVE|PROPFIND|PROPPATCH|LOCK|UNLOCK|MKCOL|ACL|REPORT)"
 ...
 </Object>
 <Object name="dav">
 PathCheck fn="check-acl" acl="dav-src"
 Service fn="service-dav" method="(GET|HEAD|POST|PUT|DELETE|COPY|MOVE|PROPFIND|PROPPATCH|LOCK|UNLOCK|MKCOL|ACL|REPORT)"
 </Object>

Note 3: All deployments of Web Server and Web Proxy Server are
affected by the issues described in bugIDs 6916391 and 6917212,
regardless of the authentication mechanism used by the Server.
Note 4: To determine the version of Sun Java System Web Server 6.1 on
a system, the following command can be run:
 $ <WS-install>/https-<host>/start -version

(Where <WS-install> is the installation directory of the Web Server
and <host> should be the actual host name on which the Web Server is
installed).

To determine the version of Sun Java System Web Server 7.0 on a
system, the following command can be run:
 $ <WS-install>/bin/wadm --version

(Where <WS-install> is the installation directory of the Web Server).
To determine the version of Sun Java System Proxy Server on a system,
the following command can be run:
 $ <PS_INSTALL>/bin/ns-proxy -v

(Where <PS_INSTALL> is the installation directory of the Proxy
Server).

3. Symptoms
Should the described issues occur, the Web Server or the Web Proxy
Server may crash, leaving the service unavailable to users for a
window of time while the server automatically restarts. Depending on
the system configuration, there may be a core file dumped after the
service crashes.
There are no predictable symptoms to indicate that these issues have
been exploited to execute arbitrary code or to access unauthorized
information.

4. Workaround
BugIDs  6916389 and 6916390:
To work around the issues described in bugIDs 6916389 and 6916390,
disable WebDAV on the Web Server. WebDAV is disabled by default on the
Web Server. If WebDAV has been enabled on the Server, the following
steps may be used to disable the feature on Web Server 6.1:

1. Remove the following entries corresponding to WebDAV, from the
virtual server's obj.conf file to disable WebDAV:
 <Object name="default">
 ...
 NameTrans fn="ntrans-dav" name="dav"
 ...
 Service fn="service-dav" method="(OPTIONS|PUT|DELETE|COPY|MOVE|PROPFIND|PROPPATCH|LOCK|UNLOCK|MKCOL|ACL|REPORT)"
 ...
 </Object>
 <Object name="dav">
 PathCheck fn="check-acl" acl="dav-src"
 Service fn="service-dav" method="(GET|HEAD|POST|PUT|DELETE|COPY|MOVE|PROPFIND|PROPPATCH|LOCK|UNLOCK|MKCOL|ACL|REPORT)"
 </Object>

This step should be performed on all virtual servers on which WebDAV
is enabled.

2. Remove the following entries from the file magnus.conf:
 Init fn="load-modules" shlib="libdavplugin.so" funcs="init-dav,ntrans-dav,
 pcheck-dav,service-dav"
 Init fn="init-dav" LateInit="yes"

On Web Server 7.0, disabling of WebDAV can be done by using the
following command:
 $<WS-install>/bin/wadm  disable-webdav --user=admin --password-file=<password_file> --host=<host> --port=<port>  --config=<config>

Note: Restart the Web Server after disabling WebDAV. Once disabled,
all legitimate uses of WebDAV will also be disabled.
BugIDs 6916391 and 6917212:
To workaround the issues described in bugIDs 6916391 (WebServer) and
6917212 (Proxy Server), the server must be prevented from processing
Authorization headers with the Digest method.
This may be accomplished in one of the following ways:

1. Filter HTTP headers containing the "Authorization: Digest" string
via firewalls, load balancers or reverse proxies. Please refer to the
appropriate documentation for configuring HTTP filters.

2. On Web Server 7.0, add the following rule to the file 'obj.conf' to
overwrite the Authorization header containing the string "Digest":
 <If defined $headers{'authorization'} and $headers{'authorization'} =~ "(?i)digest">
 NameTrans fn="set-variable" $headers{'authorization'} = "refuse"
 </If>

Note: Restart the Web Server after implementing the above steps.
Preventing the server from processing Digest headers will prevent all
legitimate uses of the Digest Authentication.
BugIDs 6916392 and 6917211:
To workaround the issues described in bugs 6916392 (Web Server) and
6917211 (Proxy Server), disable HTTP TRACE support by commenting (with
#) the corresponding entry in the 'obj.conf' file:
 # Service method="TRACE" fn="service-trace"

Restart the Web Server/Web Proxy Server after editing the file.

5. Resolution
These issues have been addressed in the following releases for the
SPARC, x86, Linux, Windows, HP-UX and AIX Platforms:
  * Sun Java System Web Server 7.0 Release 8 or later

Available at:
https://cds.sun.com/is-bin/INTERSHOP.enfinity/WFS/CDS-CDS_SMI-Site/en_US/-/USD/ViewProductDetail-Start?ProductRef=SJWS-7.0U8-OTH-G-F@CDS-CDS_SMI
  * Sun Java System Web Server 6.1 Service Pack 12 or later

Available at:
https://cds.sun.com/is-bin/INTERSHOP.enfinity/WFS/CDS-CDS_SMI-Site/en_US/-/USD/ViewProductDetail-Start?ProductRef=SJWS-6.1-SP12-OTH-G-F@CDS-CDS_SMI

A final resolution is pending completion for the Sun Java System
WebProxy Server and for the Sun Java System Web Server native patches.

For more information on Security Sun Alerts, see Technical
Instruction ID 213557.

This Sun Alert notification is being provided to you on an "AS IS"
basis. This Sun Alert notification may contain information provided by
third parties. The issues described in this Sun Alert notification may
or may not impact your system(s). Sun makes no representations,
warranties, or guarantees as to the information contained herein. ANY
AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR
NON-INFRINGEMENT, ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT
YOU ACKNOWLEDGE THAT SUN SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE
OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN.
This Sun Alert notification contains Sun proprietary and confidential
information. It is being provided to you pursuant to the provisions of
your agreement to purchase services from Sun, or, if you do not have
such an agreement, the Sun.com Terms of Use. This Sun Alert
notification may only be used for the purposes contemplated by these
agreements. 
Copyright 2000-2010 Sun Microsystems, Inc., 4150 Network Circle, Santa
Clara, CA 95054 U.S.A. All rights reserved

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iD8DBQFLX4UxNVH5XJJInbgRAodWAJ4pLYDEB/iWra7gAliPVB02FkQgEACeJ/WE
MrBD2m3QDIIcloHgmoV9Dfo=
=v4sv
-----END PGP SIGNATURE-----