This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.
The remote directory service is affected by multiple vulnerabilities.
The remote host is running the Sun Java System Directory Proxy
Server, an LDAP application-layer protocol gateway. It is typically
provided with Sun Java System Directory Server Enterprise Edition.
The installed version of Sun Java System Directory Proxy Server is
older than 18.104.22.168 and thus affected by multiple flaws :
- Under certain conditions, simultaneous long binds are
incorrectly assigned the same back-end connection. An
attacker may exploit this vulnerability to hijack
an authenticated user's session and perform unauthorized
- 'SO_KEEPALIVE' socket option is not enabled, making it
possible for a remote attacker to trigger a denial of
service condition by exhausting available connection
- 'max-client-connections' configuration setting is not
correctly implemented, making it possible for a remote
attacker to trigger a denial of service condition.
- An unspecified vulnerability in 'psearch' functionality
may allow an attacker to trigger a denial of service
See also :
Upgrade to Sun Java System Directory Server Enterprise Edition version 6.3.1
and then install patch 141958-01 or later.
Risk factor :
Medium / CVSS Base Score : 6.8
CVSS Temporal Score : 5.9
Public Exploit Available : false
Nessus Plugin ID: 43615 ()
Bugtraq ID: 37481
CVE ID: CVE-2009-4440CVE-2009-4441CVE-2009-4442CVE-2009-4443
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.