Sun Alert Notifications from Sun Weekly Report dated May 20, 2006

Original Release Date: July 6, 2006
Last Revised: July 6, 2006
Number: ASA-2006-132
Risk Level: Low
Advisory Version: 1.0
Advisory Status: Final

1. Overview:

New Sun Alert Notifications from Sun Microsystems have been issued and are described below. Issues which have been resolved by Sun Microsystems have been indicated as such. Notifications without a resolution may have restrictions to additional information on the sunsolve.sun.com website.

102024 (RESOLVED)
Security Vulnerability in Sun N1 System Manager 1.1
Product: Sun N1 System Manager
Category: Security
Date Released: 17-May-2006
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102024-1
102164 (RESOLVED)
Cross Site Scripting Vulnerability in Sun ONE and Sun Java System Applications
Product: Sun Java System Application Server Standard Edition 7 2004Q2, Sun ONE Application Server 7, Standard Edition, Sun Java System Web Server 6.1 Service Pack 4, Sun ONE Web Server 6.0 Service Pack 9, Sun Java System Application Server Enterprise Edition 7 2004Q2, Sun ONE Application Server 7, Platform Edition
Category: Security
Date Released: 18-May-2006
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102164-1
102345 (RESOLVED)
Security Vulnerability in Sun Java System Directory Server Related to Initial Installation Data
Product: Sun Java System Directory Server 5.2
Category: Security
Date Released: 16-May-2006
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102345-1
102349 (RESOLVED)
Sun StorEdge A1000/A3000/A3500/A3500FC Array Controllers Without Firmware 03.01.04.81 May Cause the Array to Exit Unexpectedly After 828 Days of Uptime
Product: RAID Manager 6.22.1
Category: Data Loss
Date Released: 19-May-2006
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102349-1
102352 (RESOLVED)
SCSI Enclosure Services (SES) Devices on a Sun StorEdge SE3510 Array May Experience Unexpected Behavior
Product: Sun StorEdge 3510 FC Array
Category: Availability
Date Released: 15-May-2006
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102352-1
102356
Security Vulnerability in the Solaris 9 in.ftpd(1M) Server May Allow Unauthorized Directory Access
Product: Solaris 9 Operating System
Category: Security
Date Released: 18-May-2006
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102356-1

Avaya System Products using a Sun Microsystems Operating System:
Avaya system products include an Operating System with the product when it is delivered. The Avaya Call Management System (CMS) and the Avaya Interactive Response (IR) are both shipped with an operating system from Sun Microsystems. Actions to be taken on those products are described below.

Recommended Actions:
Follow the recommended actions for each notification described below. This advisory will be updated as additional information becomes available.

Sun Advisory: Affected S/W Version Risk Comments or Recommended Actions
102024 All None IR and CMS are not affected. Sun N1 System Manager 1.1 is not installed.
102164 All None IR and CMS are not affected. Sun ONE and Sun Java System Applications are not installed.
102345 All None IR and CMS are not affected. Sun Java System Directory Server is not installed.
102349 All None IR and CMS are not affected. Sun StorEdge A1000/A3000/A3500/A3500FC Array Controllers are not installed.
102352 All None IR and CMS are not affected. Sun StorEdge SE3510 Array is not installed.
102356 IR All
CMS R12, R13/R13.1
Low Patches are available from Avaya services.

2. Additional Information:

Additional information may also be available via the Avaya support website and through your Avaya account representative. Please contact your Avaya product support representative, or dial 1-800-242-2121, with any questions.

3. Disclaimer:

ALL INFORMATION IS BELIEVED TO BE CORRECT AT THE TIME OF PUBLICATION AND IS PROVIDED "AS IS". AVAYA INC., ON BEHALF ITSELF AND ITS SUBSIDIARIES AND AFFILIATES (HEREINAFTER COLLECTIVELY REFERRED TO AS "AVAYA"), DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE AND FURTHERMORE, AVAYA MAKES NO REPRESENTATIONS OR WARRANTIES THAT THE STEPS RECOMMENDED WILL ELIMINATE SECURITY OR VIRUS THREATS TO CUSTOMERS' SYSTEMS. IN NO EVENT SHALL AVAYA BE LIABLE FOR ANY DAMAGES WHATSOEVER ARISING OUT OF OR IN CONNECTION WITH THE INFORMATION OR RECOMMENDED ACTIONS PROVIDED HEREIN, INCLUDING DIRECT, INDIRECT, CONSEQUENTIAL DAMAGES, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF AVAYA HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

THE INFORMATION PROVIDED HERE DOES NOT AFFECT THE SUPPORT AGREEMENTS IN PLACE FOR AVAYA PRODUCTS. SUPPORT FOR AVAYA PRODUCTS CONTINUES TO BE EXECUTED AS PER EXISTING AGREEMENTS WITH AVAYA.

4. Revision History:

V 1.0 - July 6, 2006 - Initial Statement issued.

Send information regarding any discovered security problems with Avaya products to either the contact noted in the product's documentation or securityalerts@avaya.com.

© 2006 Avaya Inc. All Rights Reserved. All trademarks identified by the ® or â"¢ are registered trademarks or trademarks, respectively, of Avaya Inc. All other trademarks are the property of their respective owners.