First published: Mon Jun 30 2008(Updated: )
Sun Java System Access Manager 6.3 through 7.1 and Sun Java System Identity Server 6.1 and 6.2 do not properly process XSLT stylesheets in XSLT transforms in XML signatures, which allows context-dependent attackers to execute arbitrary code via a crafted stylesheet, a related issue to CVE-2007-3715, CVE-2007-3716, and CVE-2007-4289.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sun Java System Identity Server | =6.2 | |
Sun Java System Access Manager | =7.1 | |
Sun Java System Access Manager | =6.3 | |
Sun Java System Identity Server | =6.1 | |
Sun Java System Access Manager | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2945 has a high severity rating due to the potential for arbitrary code execution.
To fix CVE-2008-2945, update to the latest versions of Sun Java System Access Manager and Sun Java System Identity Server.
CVE-2008-2945 affects Sun Java System Access Manager versions 6.3 to 7.1 and Sun Java System Identity Server versions 6.1 and 6.2.
Yes, CVE-2008-2945 can be exploited by context-dependent attackers, enabling remote code execution.
CVE-2008-2945 allows attackers to execute arbitrary code via crafted XSLT stylesheets.