| Summary | Format string vulnerability in libwebconsole_services.so in Sun Java Web Console 2.2.2 through 2.2.5 allows remote attackers to cause a denial of service (application crash), obtain sensitive information, and possibly execute arbitrary code via unspecified vectors during a failed login attempt, related to syslog. |
|---|---|
| Summary | Root level code execution is only possible if the web console is running as root, which it does not by default. |
| Summary | The vendor has addressed this issue through multiple product updates: Sun Java Web Console 2.2.2 Sun Java Web Console x86 2.2.2 Sun Java Web Console x86 2.2.3 Sun Java Web Console 2.2.3 Sun Java Web Console x86 2.2.4 Sun Java Web Console 2.2.4 Sun Java Web Console x86 2.2.5 Sun Java Web Console 2.2.5 |
| Publication Date | April 19, 2007, 7:19 p.m. |
| Registration Date | Jan. 29, 2021, 2:09 p.m. |
| Last Update | Oct. 17, 2018, 1:40 a.m. |
| CVSS2.0 : HIGH | |
| Score | 7.5 |
|---|---|
| Vector | AV:N/AC:L/Au:N/C:P/I:P/A:P |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃前の認証要否(Au) | 不要 |
| 機密性への影響(C) | 低 |
| 完全性への影響(I) | 低 |
| 可用性への影響(A) | 低 |
| Get all privileges. | いいえ |
| Get user privileges | いいえ |
| Get other privileges | はい |
| User operation required | いいえ |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:sun:java_web_console:2.2.2:*:x86:*:*:*:*:* | |||||
| cpe:2.3:a:sun:java_web_console:2.2.3:*:x86:*:*:*:*:* | |||||
| cpe:2.3:a:sun:java_web_console:2.2.4:*:x86:*:*:*:*:* | |||||
| cpe:2.3:a:sun:java_web_console:2.2.5:*:x86:*:*:*:*:* | |||||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:o:sun:solaris:10.0:*:x86:*:*:*:*:* | |||||
| cpe:2.3:o:sun:solaris:10.0:hw2:*:*:*:*:*:* | |||||
| Configuration3 | or higher | or less | more than | less than | |
| cpe:2.3:a:sun:java_web_console:2.2.2:*:x86:*:*:*:*:* | |||||
| cpe:2.3:a:sun:java_web_console:2.2.3:*:x86:*:*:*:*:* | |||||
| cpe:2.3:a:sun:java_web_console:2.2.4:*:x86:*:*:*:*:* | |||||
| cpe:2.3:a:sun:java_web_console:2.2.5:*:x86:*:*:*:*:* | |||||