CVE-2009-4443
https://notcve.org/view.php?id=CVE-2009-4443
Unspecified vulnerability in the psearch (aka persistent search) functionality in Directory Proxy Server (DPS) in Sun Java System Directory Server Enterprise Edition 6.0 through 6.3.1 allows remote attackers to cause a denial of service (psearch outage) by using a crafted psearch client to send requests that trigger a psearch thread loop, aka Bug Id 6855978. Vulnerabilidad no especificada en la funcionalidad psearch (también conocido como persistent search) en un Java System Directory Server Enterprise Edition v6.0 hasta v6.3.1 permite a atacantes remotos provocar una denegación de servicio (parada del psearch) al usar clientes psearch modificados para enviar peticiones que disparan un bucle en el proceso psearch, también conocido como Bug Id 6855978. • http://secunia.com/advisories/37915 http://sunsolve.sun.com/search/document.do?assetkey=1-21-141958-01-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-270789-1 http://www.securityfocus.com/bid/37481 http://www.securitytracker.com/id?1023389 http://www.vupen.com/english/advisories/2009/3647 •
CVE-2009-1332
https://notcve.org/view.php?id=CVE-2009-1332
The Online Help feature in Sun Java System Directory Server 5.2 and Enterprise Edition 5 allows remote attackers to determine the existence of files and directories, and possibly obtain partial contents of files, via unspecified vectors. La característica Online Help en Sun Java System Directory Server 5.2 y Enterprise Edition 5 permite a atacantes remotos determinar la existencia de ficheros y directorios y posiblemente obtener contenidos parciales de ficheros mediante vectores no especificados. • http://osvdb.org/53800 http://secunia.com/advisories/34751 http://sunsolve.sun.com/search/document.do?assetkey=1-66-255848-1 http://www.securityfocus.com/bid/34548 http://www.vupen.com/english/advisories/2009/1059 •
CVE-2009-0609
https://notcve.org/view.php?id=CVE-2009-0609
Sun Java System Directory Proxy Server in Sun Java System Directory Server Enterprise Edition 6.0 through 6.3, when a JDBC data source is used, does not properly handle (1) a long value in an ADD or (2) long string attributes, which allows remote attackers to cause a denial of service (JDBC backend outage) via crafted LDAP requests. Sun Java System Directory Proxy Server en Sun Java System Directory Server Enterprise Edition v6.0 hasta v6.3, cuando una fuente de datos JDBC es utilizado, no se maneja adecuadamente (1) un valor largo en un ADD o (2) atributos de cadena largos, lo que permite a atacantes remotos provocar una denegación de servicio (JDBC backend outage) a través de peticiones manipulada LDAP. • http://secunia.com/advisories/33923 http://sunsolve.sun.com/search/document.do?assetkey=1-21-125276-08-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-251086-1 http://www.securityfocus.com/bid/33761 • CWE-20: Improper Input Validation •
CVE-2009-0576
https://notcve.org/view.php?id=CVE-2009-0576
Unspecified vulnerability in Sun Java System Directory Server 5.2 p6 and earlier, and Enterprise Edition 5, allows remote attackers to cause a denial of service (daemon crash) via crafted LDAP requests. Vulnerabilidad no especificada en Sun Java System Directory Server v5.2 p6 y versiones anteriores, y Enterprise Edition v5, permite a atacantes remotos provocar una denegación de servicio (parada de demonio) mediante peticiones LDAP manipuladas. • http://secunia.com/advisories/33850 http://sunsolve.sun.com/search/document.do?assetkey=1-21-116837-04-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-250086-1 http://www.securityfocus.com/bid/33732 http://www.vupen.com/english/advisories/2009/0409 https://exchange.xforce.ibmcloud.com/vulnerabilities/48662 •
CVE-2008-1995
https://notcve.org/view.php?id=CVE-2008-1995
Sun Java System Directory Proxy Server 6.0, 6.1, and 6.2 classifies a connection using the "bind-dn" criteria, which can cause an incorrect application of policy and allows remote attackers to bypass intended access restrictions for the server. Sun Java System Directory Proxy Server 6.0, 6.1, y 6.2 clasifica una conexión utilizando el criterio "bind-dn", lo cual puede provocar una aplicación incorrecta de políticas y permitir a atacantes remotos evitar restricciones de acceso previstas por el servidor. • http://secunia.com/advisories/29978 http://sunsolve.sun.com/search/document.do?assetkey=1-26-235381-1 http://www.securityfocus.com/bid/28941 http://www.securitytracker.com/id?1019925 http://www.vupen.com/english/advisories/2008/1374/references • CWE-264: Permissions, Privileges, and Access Controls •