---------------------------------------------------------------------- Hardcore Disassembler / Reverse Engineer Wanted! Want to work with IDA and BinDiff? Want to write PoC's and Exploits? Your nationality is not important. We will get you a work permit, find an apartment, and offer a relocation compensation package. http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: Sun Java System Content Delivery Server Arbitrary File Disclosure SECUNIA ADVISORY ID: SA21628 VERIFY ADVISORY: http://secunia.com/advisories/21628/ CRITICAL: Moderately critical IMPACT: Exposure of sensitive information WHERE: >From remote SOFTWARE: Sun Java System Content Delivery Server 4.x http://secunia.com/product/11683/ Sun Java System Content Delivery Server 5.x http://secunia.com/product/11684/ DESCRIPTION: A vulnerability has been reported in Sun Java System Content Delivery Server, which can be exploited by malicious people to disclose sensitive information. The vulnerability is caused due to an unspecified error and can be exploited to disclose the contents of arbitrary files on an affected system. SOLUTION: Apply patches. -- SPARC Platform -- Sun Java System Content Delivery Server 4.0 and 4.1 (for Solaris 9): Apply patch 4.0_2004Q1_IR9_P1 or later. Sun Java System Content Delivery Server 5.0 (for Solaris 9 and 10): Apply patch 5.0_2005Q4_IR2_P1 or later. -- x86 Platform -- Sun Java System Content Delivery Server 4.0 and 4.1 (for Solaris 9): Apply patch 4.0_2004Q1_IR9_P1 or later. Sun Java System Content Delivery Server 5.0 (for Solaris 9 and 10): Apply patch 5.0_2005Q4_IR2_P1 or later. -- Hewlett-Packard HP-UX 11i -- Sun Java System Content Delivery Server 4.0 and 4.1: Apply patch 4.0_2004Q1_HP_P1 or later. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102593-1 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------