First published: Wed Mar 25 2009(Updated: )
Sun Java System Identity Manager (IdM) 7.0 through 8.0 does not use SSL in all expected circumstances, which makes it easier for remote attackers to obtain sensitive information by sniffing the network, related to "ssl termination devices" and lack of support for relative URLs.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sun Java System Identity Manager | =7.1.1 | |
Sun Java System Identity Manager | =7.0 | |
Sun Java System Identity Manager | =7.1 | |
Sun Java System Identity Manager | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1074 is classified as a medium severity vulnerability due to its potential for sensitive information exposure.
To mitigate CVE-2009-1074, it is recommended to enable SSL for all network communications involving the affected Sun Java System Identity Manager versions.
CVE-2009-1074 affects Sun Java System Identity Manager versions 7.0 through 8.0.
CVE-2009-1074 exposes sensitive information such as user credentials and personal data since SSL is not used in all circumstances.
Yes, CVE-2009-1074 can facilitate remote attacks by allowing attackers to sniff the network and capture unprotected data.