[PCWorks] Vulnerabilities in Sun Java JDK / JRE Multiple

  • From: "Clint Hamilton-PCWorks Admin" <PCWorks@xxxxxxxxxxxxxxxxxxxxxxxx>
  • To: "PCWorks@xxxxxxxxxxxxx" <pcworks@xxxxxxxxxxxxx>
  • Date: Thu, 10 Jul 2008 11:18:14 -0500

TITLE:
Sun Java JDK / JRE Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA31010

VERIFY ADVISORY:
http://secunia.com/advisories/31010/

CRITICAL:
Highly critical

IMPACT:
Security Bypass, Exposure of system information, Exposure of
sensitive information, DoS, System access

WHERE:
From remote

SOFTWARE:
Sun Java JRE 1.6.x / 6.x
http://secunia.com/product/12878/
Sun Java JDK 1.6.x
http://secunia.com/product/14273/
Sun Java SDK 1.4.x
http://secunia.com/product/1661/
Sun Java JRE 1.4.x
http://secunia.com/product/784/
Sun Java JRE 1.5.x / 5.x
http://secunia.com/product/4228/
Sun Java JRE 1.3.x
http://secunia.com/product/87/
Sun Java SDK 1.3.x
http://secunia.com/product/1660/
Sun Java JDK 1.5.x
http://secunia.com/product/4621/
Java Web Start 1.x
http://secunia.com/product/1005/
Java Web Start 5.x
http://secunia.com/product/18035/
Java Web Start 6.x
http://secunia.com/product/15779/

DESCRIPTION:
Some vulnerabilities have been reported in Sun Java, which can 
be
exploited by malicious people to bypass certain security
restrictions, disclose system information or potentially 
sensitive
information, cause a DoS (Denial of Service), or compromise a
vulnerable system.

1) An error in the Java Runtime Environment Virtual Machine can 
be
exploited by a malicious, untrusted applet to read and write 
local
files and execute local applications.

2) An error in the Java Management Extensions (JMX) management 
agent
can be exploited by a JMX client to perform certain 
unauthorized
operations on a system running JMX with local monitoring 
enabled.

3) Two errors within the scripting language support in the Java
Runtime Environment can be exploited by malicious, untrusted 
applets
to access information from another applet, read and write local
files, and execute local applications.

4) Boundary errors in Java Web Start can be exploited by an 
untrusted
Java Web Start applications to cause buffer overflows.

5) Three errors in Java Web Start can be exploited by an 
untrusted
Java Web Start applications to create or delete arbitrary files 
with
the privileges of the user running the untrusted Java Web Start
application, or to determine the location of the Java Web Start
cache.

6) An error in the implementation of Secure Static Versioning 
allows
applets to run on an older release of JRE.

7) Errors in the Java Runtime Environment can be exploited by 
an
untrusted applet to bypass the same origin policy and establish
socket connections to certain services running on the local 
host.

8) An error in the Java Runtime Environment when processing 
certain
XML data can be exploited to allow unauthorized access to 
certain URL
resources or cause a DoS.

Successful exploitation requires the JAX-WS client or service 
in a
trusted application to process the malicious XML data.

9) An error in the Java Runtime Environment when processing 
certain
XML data can be exploited by an untrusted applet or application 
to
gain unauthorized access to certain URL resources.

10) A boundary error when processing fonts in the Java Runtime
Environment can be exploited to cause a buffer overflow.

Please see the vendor advisories for details on affected 
products and
versions.

SOLUTION:
Update to the fixed version.

JDK and JRE 6 Update 7:
http://java.sun.com/javase/downloads/index.jsp

JDK and JRE 5.0 Update 16:
http://java.sun.com/javase/downloads/index_jdk5.jsp

SDK and JRE 1.4.2_18:
http://java.sun.com/j2se/1.4.2/download.html

SDK and JRE 1.3.1_23 (for customers with Solaris 8 and Vintage
Support Offering support contracts):
http://java.sun.com/j2se/1.3/download.html

ORIGINAL ADVISORY:
Sun:
http://sunsolve.sun.com/search/document.do?assetkey=1-66-238628-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-238666-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-238687-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-238905-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-238965-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-238966-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-238967-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-238968-1


=========================
The list's FAQ's can be seen by sending an email to 
PCWorks-request@xxxxxxxxxxxxx with FAQ in the subject line.

To unsubscribe, subscribe, set Digest or Vacation to on or off, go to 
//www.freelists.org/list/pcworks .  You can also send an email to 
PCWorks-request@xxxxxxxxxxxxx with Unsubscribe in the subject line.  Your 
member list settings can be found at 
//www.freelists.org/cgi-bin/lsg2.cgi/l=pcworks .  Once logged in, you have 
access to numerous other email options.  

The list archives are located at //www.freelists.org/archives/pcworks/ .  
All email posted to the list will be placed there in the event anyone needs to 
look for previous posts.

Other related posts:

  • » [PCWorks] Vulnerabilities in Sun Java JDK / JRE Multiple