Sun Alert Notifications from Sun Weekly Report dated Oct 07, 2006
Original Release Date: November 17, 2006
Last Revised: August 16, 2007
Number: ASA-2006-250
Risk Level: Low
Advisory Version: 2.0
Advisory Status: Interim
1. Overview:
New Sun Alert Notifications from Sun Microsystems have been issued and are
described below. Issues which have been resolved by Sun Microsystems have
been indicated as such. Notifications without a resolution may have
restrictions to additional information on the
sunsolve.sun.com website.
- 102606 (RESOLVED)
- Security Vulnerability in Solaris 10 Link Aggregation may Allow Local Users
Total Access to Network Packets
- Product: Solaris 10 Operating System
- Category: Security
- Date Released: 06-Oct-2006
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102606-1
- 102636 (RESOLVED)
- Host May Panic In Veritas Oracle Disk Manager (ODM) Driver After 'DR'
Operation
- Product: VERITAS Storage Foundation 4.1 Software
- Category: Availability
- Date Released: 02-Oct-2006
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102636-1
- 102640 (RESOLVED)
- Security Vulnerability in Apache 2 Web Server Module 'mod_ssl'
- Product: Solaris 10 Operating System
- Category: Security
- Date Released: 04-Oct-2006
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102640-1
- 102648
- Security Vulnerability in RSA Signature Verification Impacting
Multiple SUN
Products
- Product: Sun Security Services
- Category: Security
- Date Released: 02-Oct-2006
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1
- 102651 (RESOLVED)
- Platform Specific Issues on Sun Fire T1000/T2000 Systems Can Cause
the
System to Panic
- Product: Sun Fire T2000 Server, Sun Fire T1000 Server
- Category: Availability, Availability
- Date Released: 02-Oct-2006
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102651-1
- 102652
- Security Vulnerability in X Display Manager (xdm(1)) Xsession
Script
- Product: Solaris 9 Operating System, Solaris 10 Operating System,
Solaris 8
Operating System
- Category: Security
- Date Released: 06-Oct-2006
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102652-1
- 102655
- Certain Brocade Switches May Panic When Performing Zone Changes
- Product: Brocade SilkWorm 3850 Fabric Switch, Brocade SilkWorm 24000
Director, Brocade SilkWorm 3250 Fabric Switch, Brocade SilkWorm 200E Fibre
Channel Switch, Brocade 12000 2 GB Switch, Brocade SilkWorm 48000 Director,
Brocade SilkWorm 4100 Enterprise Fabric Switch, Brocade SilkWorm 3900
Switch
- Category: Availability
- Date Released: 06-Oct-2006
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102655-1
- 102657
- Security Vulnerability With RSA Signature Affects the Sun Secure Global
Desktop Software
- Product: Sun Secure Global Desktop Software 4.2
- Category: Security
- Date Released: 06-Oct-2006
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1
Avaya System Products using a Sun Microsystems Operating System:
Avaya system products include an Operating System with the product when it is
delivered. The Avaya Call Management System (CMS) and the
Avaya Interactive Response (IR) are both shipped with an
operating system from Sun Microsystems. Actions to be taken on those
products are described below.
Recommended Actions:
Follow the recommended actions for each
notification described below. This advisory will be updated as additional
information becomes available.
Sun Advisory:
Affected S/W Version
Risk
Comments or Recommended Actions
102606
CMS - All
IR - 2.0
None
CMS does not use Solaris 10 and IR 2.0 does not use link aggregation in
Solaris 10.
102636
CMS - All
IR - All
None
Neither CMS or IR install or use the Veritas Oracle Disk Manager
software.
102640
CMS - All
IR - 2.0
CMS - None
IR - Low
CMS does not use the Solaris 10 platform
IR is currently testing patches and will advise when they are available.
102648
CMS - All
IR - All
CMS - None
IR - Low
CMS does not utilize the products listed.
IR is vulnerable and is awaiting a patch from Sun.
102651
CMS - All
IR - All
None
Neither CMS or IR utilize the Sun Fire T1000 or T2000 platforms.
102652
CMS - V9, V11, R12, R13/R13.1
IR - 2.0
CMS - Low
IR - None
CMS - For CMS V9 and V11 systems install patch 111844-04. For
CMS R12 and R13/R13.1 install patch 124830-01.
IR - IR is not affected by this issue however customers can use the
workaround detailed in "Workarounds" below until a patch becomes
available.
102655
CMS - All
IR - All
None
Neither CMS or IR utilize Sun Brocade Switches.
102657
CMS - All
IR - All
None
Neither CMS or IR install and/or use the Sun Global Desktop Software.
Workarounds
Two workarounds for Sun Alert ID 102652 are provided below (as provided by
the Sun Alert). Select one of the two to implement.
A) Use an alternate login mechanism such as dtlogin(1) or if using Solaris
10, gdm(1).
or:
B) Modify the xdm(1) configuration file, xdm-config, and create a new
Xsession file using the following commands as the root user:
# cd /usr/openwin/lib/X11/xdm
# mv xdm-config xdm-config.orig
# sed -e 's/cp \/dev\/null "$errfile"/umask 077 \&\& cp \/dev\/null
"$errfile"/' Xsession> /etc/X11/Xsession
# sed -e 's/\/usr\/openwin\/lib\/X11\/xdm\/Xsession/\/etc\/X11\/Xsession/'
xdm-config.orig> xdm-config
then restore executable permissions to the file by running the following
command:
# chmod 755 Xsession
2. Additional Information:
Additional information may also be available via the Avaya support
website and through your Avaya account
representative. Please contact your Avaya product support representative, or
dial 1-800-242-2121, with any questions.
3. Disclaimer:
ALL INFORMATION IS BELIEVED TO BE CORRECT AT THE TIME OF PUBLICATION AND IS
PROVIDED "AS IS". AVAYA INC., ON BEHALF ITSELF AND ITS SUBSIDIARIES AND
AFFILIATES (HEREINAFTER COLLECTIVELY REFERRED TO AS "AVAYA"), DISCLAIMS ALL
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE AND FURTHERMORE, AVAYA
MAKES NO REPRESENTATIONS OR WARRANTIES THAT THE STEPS RECOMMENDED WILL
ELIMINATE SECURITY OR VIRUS THREATS TO CUSTOMERS' SYSTEMS. IN NO EVENT SHALL
AVAYA BE LIABLE FOR ANY DAMAGES WHATSOEVER ARISING OUT OF OR IN CONNECTION
WITH THE INFORMATION OR RECOMMENDED ACTIONS PROVIDED HEREIN, INCLUDING
DIRECT, INDIRECT, CONSEQUENTIAL DAMAGES, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF AVAYA HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
THE INFORMATION PROVIDED HERE DOES NOT AFFECT THE SUPPORT AGREEMENTS IN PLACE
FOR AVAYA PRODUCTS. SUPPORT FOR AVAYA PRODUCTS CONTINUES TO BE EXECUTED AS
PER EXISTING AGREEMENTS WITH AVAYA.
4. Revision History:
V 1.0 - November 17, 2006 - Initial Statement issued.
V 2.0 - August 16, 2007 - Updated CMS response for Sun Alert ID 102652 to
include approved patches.
Send information regarding any discovered security problems with Avaya
products to either the contact noted in the product's documentation or
[email protected].
© 2006 Avaya Inc. All Rights Reserved. All trademarks identified by the
® or ™ are registered trademarks or trademarks, respectively, of
Avaya Inc. All other trademarks are the property of their respective
owners.