Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Firewall)  >   Symantec Enterprise Firewall (Raptor) Vendors:   Symantec
(Symantec Issues Fix for Symantec Enterprise Firewall) Sun Java Plug-in Java-to-Javascript Bug Lets Remote Applets Execute Arbitrary Code
SecurityTracker Alert ID:  1012782
SecurityTracker URL:
CVE Reference:   CVE-2004-1029   (Links to External Site)
Date:  Jan 6 2005
Impact:   Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 8.0
Description:   iDEFENSE reported a vulnerability in Sun's Java plug-in. A remote applet can bypass Java sandbox security mechanisms and execute arbitrary code on the target system.

It is reported that a remote user can create an applet that, when loaded by the target user, can exploit a flaw in the plug-in's Java to Javascript data exchange to bypass access controls and load an unsafe Java class. The applet can upload or download arbitrary files and execute arbitrary files with the privileges of the target user.

Web browsers using the plug-in with an affected version of the Java Virtual Machine are vulnerable.

The vendor was notified on June 29, 2004.

The original advisory is available at:

Impact:   A remote user can execute arbitrary code on the target user's system.
Solution:   Symantec has issued a hotfix for the Symantec Enterprise Firewall, which is affected by the JRE vulnerability. The hotfix is available via the Symantec Enterprise Support site at:

Vendor URL: (Links to External Site)
Cause:   Access control error
Underlying OS:  UNIX (Solaris - SunOS), Windows (NT), Windows (2000)

Message History:   This archive entry is a follow-up to the message listed below.
Nov 22 2004 Sun Java Plug-in Java-to-Javascript Bug Lets Remote Applets Execute Arbitrary Code

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC