SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   BEA JRockit Vendors:   Oracle
(Oracle Issues Fix for JRockit) Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1025798
SecurityTracker URL:  http://securitytracker.com/id/1025798
CVE Reference:   CVE-2011-0873   (Links to External Site)
Date:  Jul 19 2011
Impact:   Denial of service via network, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): R27.6.9 and before: JRE/JDK 1.4.2, 5 and 6; R28.1.3 and before: JRE/JDK 5 and 6
Description:   Multiple vulnerabilities were reported in Java Runtime Environment (JRE). A remote user can cause arbitrary code to be executed on the target user's system. Oracle JRockit is affected by one vulnerability.

A remote user can create a specially crafted Java applet or Java Web Start application that, when loaded by the target user, will access or modify data on the target user's system or execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

The 2D [CVE-2011-0862, CVE-2011-0868, CVE-2011-0873], AWT [CVE-2011-0815], Deployment [CVE-2011-0786, CVE-2011-0788, CVE-2011-0817, CVE-2011-0863], HotSpot [CVE-2011-0864], Sound [CVE-2011-0802, CVE-2011-0814], Swing [CVE-2011-0871], JRE [CVE-2011-0866], Networking [CVE-2011-0867], SAAJ [CVE-2011-0869], and Deserialization [CVE-2011-0865] components are affected.

A remote user can supply specially crafted data to an API to cause partial denial of service conditions. The NIO component is affected [CVE-2011-0872].

An Anonymous Reporter of TippingPoint's Zero Day Initiative; binaryproof via iDefense; binaryproof via Tipping Point; Chris Ries via Tipping Point; Hisashi Kojima of Fujitsu Laboratories via JPCERT/CC; iDefense; Marc Schoenefeld of Red Hat; Peter Vreugdenhil of TippingPoint DVLabs; and Stephen Fewer of Harmony Security via Tippingpoint reported these vulnerabilities.

Impact:   A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system.

A remote user can cause partial denial of service conditions on the target system.

Solution:   Oracle has issued a fix for JRockit for CVE-2011-0873, described in their July 2011 Critical Patch Update advisory.

The vendor's advisory is available at:

http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html

Vendor URL:  www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html (Links to External Site)
Cause:   Not specified
Underlying OS:   Linux (Any), UNIX (Solaris - SunOS), Windows (Any)

Message History:   This archive entry is a follow-up to the message listed below.
Jun 7 2011 Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code



 Source Message Contents

Date:  Tue, 19 Jul 2011 21:55:25 +0000
Subject:  Oracle JRockit


CVE-2011-0873
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC