SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   BEA JRockit Vendors:   BEA Systems
(BEA Issues Fix for JRockit) Java Runtime Environment Bugs in Image Parsing Library Let Remote Users Gain Privileges
SecurityTracker Alert ID:  1019867
SecurityTracker URL:  http://securitytracker.com/id/1019867
CVE Reference:   CVE-2008-1193, CVE-2008-1194   (Links to External Site)
Date:  Apr 16 2008
Impact:   Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): R27.5.0 and prior versions
Description:   A vulnerability was reported in Java. A remote user can access files on the target user's system. A remote user can cause arbitrary applications on the target user's system to be executed. BEA JRockit is affected.

A remote user can create a specially crafted applet that, when loaded by the target user, will trigger flaws in the image parsing library to gain access to files on the target system or execute arbitrary applications that reside on the target system.

Some flaws in the color management library may cause JRE to crash.

SDK and JRE 1.4.x and 1.3.x are not affected by these vulnerabilities.

Chris Evans of the Google Security Team reported the privilege escalation vulnerabilities.

Impact:   A remote user can create an applet that, when loaded by the target user, will access files or execute arbitrary applications on the target user's system.
Solution:   BEA has issued the following fixes for JRockit, which is affected by this vulnerability.


JRockit 1.4.2 R27.5.0 JDK Linux (x86 - 32 bit):

ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-R27.5.0-jdk1.4.2_16-linux-ia32.bin

JRockit 5.0 R27.5.0 JDK Linux (x86 - 32 bit):

ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-R27.5.0-jdk1.5.0_14-linux-ia32.bin

JRockit 6 R27.5.0 JDK Linux (x86 - 32 bit):

ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-R27.5.0-jdk1.6.0_03-linux-ia32.bin

JRockit 5.0 R27.5.0 JDK Linux (Intel EM64T & AMD64 - 64 bit):

ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-R27.5.0-jdk1.5.0_14-linux-x64.bin

JRockit 6 R27.5.0 JDK Linux (Intel EM64T & AMD64 - 64 bit):

ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-R27.5.0-jdk1.6.0_03-linux-x64.bin

JRockit 1.4.2 R27.5.0 JDK Linux (Intel Itanium - 64 bit):

ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-R27.5.0-jdk1.4.2_16-linux-ipf.bin

JRockit 5.0 R27.5.0 JDK Linux (Intel Itanium - 64-bit):

ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-R27.5.0-jdk1.5.0_14-linux-ipf.bin

JRockit 1.4.2 R27.5.0 JDK Sun Solaris (SPARC - 64 bit):

ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-R27.5.0-jdk1.4.2_16-solaris-sparcv9.bin

JRockit 5.0 R27.5.0 JDK Solaris (SPARC - 64-bit):

ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-R27.5.0-jdk1.5.0_14-solaris-sparcv9.bin

JRockit 6 R27.5.0 JDK Solaris (SPARC - 64-bit):

ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-R27.5.0-jdk1.6.0_03-solaris-sparcv9.bin

BEA JRockit 1.4.2 R27.5.0 JDK Microsoft Windows (x86 - 32 bit):

ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-R27.5.0-jdk1.4.2_16-windows-ia32.exe

JRockit 5.0 R27.5.0 JDK Microsoft Windows (x86 - 32 bit):

ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-R27.5.0-jdk1.5.0_14-windows-ia32.exe

JRockit 6 R27.5.0 JDK Microsoft Windows (x86 - 32 bit):

ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-R27.5.0-jdk1.6.0_03-windows-ia32.exe

JRockit 5.0 R27.5.0 JDK Microsoft Windows (Intel EM64T & AMD64 - 64 bit):

ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-R27.5.0-jdk1.5.0_14-windows-x64.exe

JRockit 6 R27.5.0 JDK Microsoft Windows (Intel EM64T & AMD64 - 64 bit):

ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-R27.5.0-jdk1.6.0_03-windows-x64.exe

JRockit 1.4.2 R27.5.0 JDK Microsoft Windows (Intel Itanium - 64 bit):

ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-R27.5.0-jdk1.4.2_16-windows-ipf.exe

JRockit 5.0 R27.5.0 JDK Microsoft Windows (Intel Itanium - 64 bit):

ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-R27.5.0-jdk1.5.0_14-windows-ipf.exe

The BEA advisory is available at:

http://dev2dev.bea.com/pub/advisory/277

Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (Solaris - SunOS), Windows (Any)

Message History:   This archive entry is a follow-up to the message listed below.
Mar 6 2008 Java Runtime Environment Bugs in Image Parsing Library Let Remote Users Gain Privileges



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC