Sun Alert Notifications from Sun Weekly Report dated Aug 26, 2006

Original Release Date: October 4, 2006
Last Revised: October 6, 2006
Number: ASA-2006-205
Risk Level: Low
Advisory Version: 1.1
Advisory Status: Final

1. Overview:

New Sun Alert Notifications from Sun Microsystems have been issued and are described below. Issues which have been resolved by Sun Microsystems have been indicated as such. Notifications without a resolution may have restrictions to additional information on the sunsolve.sun.com website.

102502 (RESOLVED)
Transition From ipge to e1000g Network Driver
Product: Solaris 10 Operating System
Category: Availability
Date Released: 24-Aug-2006
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102502-1
102513 (RESOLVED)
pkgadd(1M) May Set Incorrect Permissions if The pkgmap(4) File Contains a "?" in The "Mode" Field
Product: Solaris 10 Operating System
Category: Security
Date Released: 25-Aug-2006
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102513-1
102514 (RESOLVED)
Security Vulnerability May Allow Users With the "File System Management" RBAC Profile to Gain Elevated Privileges
Product: Solaris 9 Operating System, Solaris 8 Operating System
Category: Security
Date Released: 21-Aug-2006
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102514-1
102519 (RESOLVED)
Security Vulnerability Due to Buffer Overflow in The format(1M) Command May Allow Privilege Elevation For Certain RBAC Profiles
Product: Solaris 9 Operating System, Solaris 10 Operating System, Solaris 8 Operating System
Category: Security
Date Released: 21-Aug-2006
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102519-1
102550
Multiple Security Vulnerabilities in Mozilla 1.4 and 1.7 for Solaris and for Sun JDS for Linux
Product: Mozilla v1.7, Solaris 10 Operating System, Sun Java Desktop System Release 2, Mozilla 1.4 for Solaris
Category: Security
Date Released: 22-Aug-2006
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102550-1
102556
Failed Upgrade on a Sun StorEdge 6920 May Lead to Loss of Configuration
Product: Sun StorEdge 6920 System
Category: Availability
Date Released: 25-Aug-2006
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102556-1
102557 (RESOLVED)
Java Plug-in and Java Web Start May Allow Applets and Applications to Run With Unpatched JRE
Product: Java 2 Platform, Standard Edition
Category: Security
Date Released: 21-Aug-2006
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102557-1
102582
Sun Fire T2000 With System Firmware Patch 123482-01 Will Not Allow DVD-boot or Net-boot of Solaris 10 1/06 or Solaris 10 6/06
Product: Sun Fire T2000 Server
Category: Availability, Availability
Date Released: 21-Aug-2006
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102582-1
102588 (RESOLVED)
V440 system generates "WARNING: Using Debug SEEPROM for CPU 1 Disabling auto-boot"
Product: Sun Fire V440 Server
Category: Availability
Date Released: 25-Aug-2006
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102588-1
102589
Gigaswift Driver Patch Without Sun Trunking Utility (3.1) Patch May Cause a System Panic
Product: Sun Trunking 1.3 Software
Category: Availability, Availability
Date Released: 24-Aug-2006
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102589-1
102593 (RESOLVED)
Security Vulnerability in the Sun Java System Content Delivery Server May Allow Unauthorized Data Access
Product: Sun Java System Content Delivery Server 5.0, Sun Java System Content Delivery Server 2004Q1
Category: Security
Date Released: 24-Aug-2006
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102593-1

Avaya System Products using a Sun Microsystems Operating System:
Avaya system products include an Operating System with the product when it is delivered. The Avaya Call Management System (CMS) and the Avaya Interactive Response (IR) are both shipped with an operating system from Sun Microsystems. Actions to be taken on those products are described below.

Recommended Actions:
Follow the recommended actions for each notification described below. This advisory will be updated as additional information becomes available.

Sun Advisory: Affected S/W Version Risk Comments or Recommended Actions
102502 CMS

IR 2.0
None

Low
CMS does not utilize Solaris 10. No action is required.

This issue is resolved in Solaris patch cluster 09/06. Avaya recommends installing patch cluster 09/06.
102513 CMS - All

IR 2.0
None

Low
CMS does not utilize Solaris 10. No action is required.

This issue is resolved in Solaris patch cluster 09/06. Avaya recommends installing patch cluster 09/06.
102514 CMS V9, V11, R12, R13/R13.1

IR running on Solaris 8
Low

Low
Patches have been tested and are available from Avaya Services.

This issue is resolved in Solaris patch cluster 09/06. Avaya recommends installing patch cluster 09/06.
102519 CMS V9, V11, R12, R13/R13.1

IR running on Solaris 8 and 10
Low

Low
Patches have been tested and are available from Avaya Services. These patches are the same patches for Sun ID 102514, and so installing the patches will fix both issues for CMS systems.

This issue is resolved in Solaris patch cluster 09/06. Avaya recommends installing patch cluster 09/06.
102550 CMS - All

IR 2.0
None

Low
CMS does not utilize Solaris 10, Mozilla v1.7, Firefox v1.4, or Sun Java Desktop System release 2. No action is required.

This issue is resolved in Solaris patch 119115-18. Avaya recommends installing patch 119115-18.
102556 All None IR and CMS do not utilize StorEdge 6290. No action is required.
102557 CMS



IR
None



Low

CMS does not utilize Java 2 Platform Standard Edition. No action is required.


Workarounds for this issue are posted to Sun's advisory site at:
102582 All None IR and CMS do not utilize Sun Fire T2000 Servers. No action is required.
102588 All None IR and CMS do not utilize Sun Fire V440 Servers. No action is required.
102589 All None IR and CMS do not utilize Sun Trunking 1.3 Software. No action is required.
102593 All None IR and CMS do not utilize Sun Java System Content Delivery Servers. No action is required.

2. Additional Information:

Additional information may also be available via the Avaya support website and through your Avaya account representative. Please contact your Avaya product support representative, or dial 1-800-242-2121, with any questions.

3. Disclaimer:

ALL INFORMATION IS BELIEVED TO BE CORRECT AT THE TIME OF PUBLICATION AND IS PROVIDED "AS IS". AVAYA INC., ON BEHALF ITSELF AND ITS SUBSIDIARIES AND AFFILIATES (HEREINAFTER COLLECTIVELY REFERRED TO AS "AVAYA"), DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE AND FURTHERMORE, AVAYA MAKES NO REPRESENTATIONS OR WARRANTIES THAT THE STEPS RECOMMENDED WILL ELIMINATE SECURITY OR VIRUS THREATS TO CUSTOMERS' SYSTEMS. IN NO EVENT SHALL AVAYA BE LIABLE FOR ANY DAMAGES WHATSOEVER ARISING OUT OF OR IN CONNECTION WITH THE INFORMATION OR RECOMMENDED ACTIONS PROVIDED HEREIN, INCLUDING DIRECT, INDIRECT, CONSEQUENTIAL DAMAGES, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF AVAYA HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

THE INFORMATION PROVIDED HERE DOES NOT AFFECT THE SUPPORT AGREEMENTS IN PLACE FOR AVAYA PRODUCTS. SUPPORT FOR AVAYA PRODUCTS CONTINUES TO BE EXECUTED AS PER EXISTING AGREEMENTS WITH AVAYA.

4. Revision History:

V 1.0 - October 4, 2006 - Initial Statement issued.
V 1.1 - October 6, 2006 - Corrected overall severity to Low.

Send information regarding any discovered security problems with Avaya products to either the contact noted in the product's documentation or securityalerts@avaya.com.

© 2006 Avaya Inc. All Rights Reserved. All trademarks identified by the ® or ™ are registered trademarks or trademarks, respectively, of Avaya Inc. All other trademarks are the property of their respective owners.