First published: Mon Dec 28 2009(Updated: )
Unspecified vulnerability in the psearch (aka persistent search) functionality in Directory Proxy Server (DPS) in Sun Java System Directory Server Enterprise Edition 6.0 through 6.3.1 allows remote attackers to cause a denial of service (psearch outage) by using a crafted psearch client to send requests that trigger a psearch thread loop, aka Bug Id 6855978.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sun Java System Directory Server | =6.1-enterprise | |
Sun Java System Directory Server | =6.3-enterprise | |
Sun Java System Directory Server | =6.2-enterprise | |
Sun Java System Directory Server | =6.3.1-enterprise | |
Sun Java System Directory Server | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4443 has been assessed to allow for remote denial of service attacks on affected systems.
To mitigate CVE-2009-4443, you should upgrade to a patched version of Sun Java System Directory Server Enterprise Edition, specifically version 6.4 or a later release.
The affected versions include Sun Java System Directory Server Enterprise Edition 6.0, 6.1, 6.2, 6.3, and 6.3.1.
Yes, CVE-2009-4443 can be exploited remotely using crafted psearch client requests.
The impact of CVE-2009-4443 is a denial of service, resulting in outages for the persistent search functionality in the Directory Proxy Server.