{"vuid":"VU#964401","idnumber":"964401","name":"Sun Java System Web Proxy Server vulnerable to buffer overflow","keywords":["sun","java","web proxy","buffer overflow","arbitrary code"],"overview":"Buffer overflow vulnerabilities in the Java System Web Proxy Server may allow remote attackers to execute arbitrary code or cause a denial-of-service condition.","clean_desc":"The Java System Web Proxy Server  is a caching HTTP proxy server. A lack of bounds checking in the Java System Web Proxy Server may allow remotely exploitable buffer overflow to occur. Specific details are not available at this time. This vulnerability affects Java System Web Proxy Server software on all platforms.","impact":"A remote attacker may be able to execute arbitrary code with the privileges of the Java System Web Proxy Server process, or cause a denial-of-service condition.","resolution":"Upgrade These issues were fixed as of Java System Web Proxy Server 3.6 Service Pack 5.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported in Sun Microsystems Alert 57606. Sun credits Matt Moore of Pentest Limited, for providing information regarding these issues.","author":"This document was written by Jeff Gennari.","public":["http://sunsolve.sun.com/search/printfriendly.do?assetkey=1-26-57606-1","http://secunia.com/advisories/13036/","http://www.ciac.org/ciac/bulletins/p-027.shtml","http://securitytracker.com/alerts/2004/Oct/1012005.html"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-11-02T20:51:00Z","publicdate":"2004-10-29T00:00:00Z","datefirstpublished":"2004-12-01T20:18:14Z","dateupdated":"2004-12-17T13:18:21Z","revision":56,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"4","cam_population":"10","cam_impact":"17","cam_easeofexploitation":"11","cam_attackeraccessrequired":"10","cam_scorecurrent":"6.661875","cam_scorecurrentwidelyknown":"8.415","cam_scorecurrentwidelyknownexploited":"15.4275","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":6.661875,"vulnote":null}