SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   BEA JRockit Vendors:   BEA Systems
(BEA Issues Fix for JRockit) Java Runtime Environment Lets Remote Applets and Applications Gain Elevated Privileges
SecurityTracker Alert ID:  1019864
SecurityTracker URL:  http://securitytracker.com/id/1019864
CVE Reference:   CVE-2008-0657   (Links to External Site)
Date:  Apr 16 2008
Impact:   Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): R27.5.0 and prior versions
Description:   A vulnerability was reported in Java Runtime Environment (JRE). A remote user can access files and execute applications residing on the target user's system. BEA JRockit is affected.

A remote user can create a specially crafted application or applet that, when loaded by the target user, will be able to gain elevated privileges on the target user's system. The application or applet can read and write local files and execute local applications with the privileges of the target user running the untrusted application or applet.

Impact:   A remote user can create an applet or application that, when loaded by the target user, will access files and execute applications residing on the target user's system.
Solution:   BEA has issued the following fixes for JRockit, which is affected by this vulnerability.

JRockit 1.4.2 R27.5.0 JDK Linux (x86 - 32 bit):

ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-R27.5.0-jdk1.4.2_16-linux-ia32.bin

JRockit 5.0 R27.5.0 JDK Linux (x86 - 32 bit):

ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-R27.5.0-jdk1.5.0_14-linux-ia32.bin

JRockit 6 R27.5.0 JDK Linux (x86 - 32 bit):

ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-R27.5.0-jdk1.6.0_03-linux-ia32.bin

JRockit 5.0 R27.5.0 JDK Linux (Intel EM64T & AMD64 - 64 bit):

ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-R27.5.0-jdk1.5.0_14-linux-x64.bin

JRockit 6 R27.5.0 JDK Linux (Intel EM64T & AMD64 - 64 bit):

ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-R27.5.0-jdk1.6.0_03-linux-x64.bin

JRockit 1.4.2 R27.5.0 JDK Linux (Intel Itanium - 64 bit):

ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-R27.5.0-jdk1.4.2_16-linux-ipf.bin

JRockit 5.0 R27.5.0 JDK Linux (Intel Itanium - 64-bit):

ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-R27.5.0-jdk1.5.0_14-linux-ipf.bin

JRockit 1.4.2 R27.5.0 JDK Sun Solaris (SPARC - 64 bit):

ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-R27.5.0-jdk1.4.2_16-solaris-sparcv9.bin

JRockit 5.0 R27.5.0 JDK Solaris (SPARC - 64-bit):

ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-R27.5.0-jdk1.5.0_14-solaris-sparcv9.bin

JRockit 6 R27.5.0 JDK Solaris (SPARC - 64-bit):

ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-R27.5.0-jdk1.6.0_03-solaris-sparcv9.bin

BEA JRockit 1.4.2 R27.5.0 JDK Microsoft Windows (x86 - 32 bit):

ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-R27.5.0-jdk1.4.2_16-windows-ia32.exe

JRockit 5.0 R27.5.0 JDK Microsoft Windows (x86 - 32 bit):

ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-R27.5.0-jdk1.5.0_14-windows-ia32.exe

JRockit 6 R27.5.0 JDK Microsoft Windows (x86 - 32 bit):

ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-R27.5.0-jdk1.6.0_03-windows-ia32.exe

JRockit 5.0 R27.5.0 JDK Microsoft Windows (Intel EM64T & AMD64 - 64 bit):

ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-R27.5.0-jdk1.5.0_14-windows-x64.exe

JRockit 6 R27.5.0 JDK Microsoft Windows (Intel EM64T & AMD64 - 64 bit):

ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-R27.5.0-jdk1.6.0_03-windows-x64.exe

JRockit 1.4.2 R27.5.0 JDK Microsoft Windows (Intel Itanium - 64 bit):

ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-R27.5.0-jdk1.4.2_16-windows-ipf.exe

JRockit 5.0 R27.5.0 JDK Microsoft Windows (Intel Itanium - 64 bit):

ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-R27.5.0-jdk1.5.0_14-windows-ipf.exe

The BEA advisory is available at:

http://dev2dev.bea.com/pub/advisory/277

Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (Solaris - SunOS), Windows (Any)

Message History:   This archive entry is a follow-up to the message listed below.
Feb 6 2008 Java Runtime Environment Lets Remote Applets and Applications Gain Elevated Privileges



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC