Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:11351
HistoryFeb 08, 2006 - 12:00 a.m.

[SA18760] Sun Java JRE "reflection" APIs Sandbox Security Bypass Vulnerabilities

2006-02-0800:00:00
vulners.com
7

TITLE:
Sun Java JRE "reflection" APIs Sandbox Security Bypass
Vulnerabilities

SECUNIA ADVISORY ID:
SA18760

VERIFY ADVISORY:
http://secunia.com/advisories/18760/

CRITICAL:
Highly critical

IMPACT:
System access

WHERE:
>From remote

SOFTWARE:
Sun Java JDK 1.5.x
http://secunia.com/product/4621/
Sun Java JRE 1.3.x
http://secunia.com/product/87/
Sun Java JRE 1.4.x
http://secunia.com/product/784/
Sun Java JRE 1.5.x / 5.x
http://secunia.com/product/4228/
Sun Java SDK 1.3.x
http://secunia.com/product/1660/
Sun Java SDK 1.4.x
http://secunia.com/product/1661/

DESCRIPTION:
Seven vulnerabilities have been reported in Sun Java JRE (Java
Runtime Environment), which potentially can be exploited by malicious
people to compromise a user's system.

The vulnerabilities are caused due to various unspecified errors in
the "reflection" APIs. This may be exploited by a malicious,
untrusted applet to read and write local files or execute local
applications.

The following releases are affected by one or more of the seven
vulnerabilities on Windows, Solaris, and Linux platforms:

  • JDK and JRE 5.0 Update 5 and prior
  • SDK and JRE 1.4.2_09 and prior
  • SDK and JRE 1.3.1_16 and prior

SOLUTION:
Update to the fixed versions.

JDK and JRE 5.0:
Update to JDK and JRE 5.0 Update 6 or later.
http://java.sun.com/j2se/1.5.0/download.jsp

SDK and JRE 1.4.x:
Update to SDK and JRE 1.4.2_10 or later.
http://java.sun.com/j2se/1.4.2/download.html

SDK and JRE 1.3.x:
Update to SDK and JRE 1.3.1_17 or later.
http://java.sun.com/j2se/1.3/download.html

PROVIDED AND/OR DISCOVERED BY:
The vendor credits Adam Gowdiak for reporting five of the seven
vulnerabilities.

ORIGINAL ADVISORY:
Sun Microsystems:
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102171-1


About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.