SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Oracle Java Plug-in Vendors:   Sun
Java Plug-in Bug Lets Remote Users Execute Local Applications on the Target User's System
SecurityTracker Alert ID:  1019550
SecurityTracker URL:  http://securitytracker.com/id/1019550
CVE Reference:   CVE-2008-1192   (Links to External Site)
Updated:  Mar 7 2008
Original Entry Date:  Mar 6 2008
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): SDK and JRE 1.4.2_16 and prior; JDK and JRE 5.0 Update 14 and prior; 6 Update 4 and and prior; SDK and JRE 1.3.1_21 and prior
Description:   A vulnerability was reported in the Java Plug-in. A remote user can cause arbitrary applications on the target user's system to be executed.

A remote user can create a specially crafted applet that, when loaded by the target user via a web site, will bypass the same-origin policy and execute arbitrary applications located on the target system.

John Heasman of NGSSoftware reported this vulnerability.

Impact:   A remote user can create an applet that, when loaded by the target user, will execute arbitrary applications located on the target user's system.
Solution:   Sun has issued the following fixes.

* JDK and JRE 6 Update 5 or later
* JDK and JRE 5.0 Update 15 or later
* SDK and JRE 1.4.2_17 or later
* SDK and JRE 1.3.1_22 or later

JDK and JRE 6 Update 5 is available for download at the following links:

http://java.sun.com/javase/downloads/index.jsp
http://java.com/

JRE 6 Update 5 is available through the Java Update Tool for Microsoft Windows users.

JDK 6 Update 5 for Solaris is available in the following patches:

* Java SE 6: update 5 (as delivered in patch 125136-07 or later)
* Java SE 6: update 5 (as delivered in patch 125137-07 or later (64bit))
* Java SE 6_x86: update 5 (as delivered in patch 125138-07 or later)
* Java SE 6_x86: update 5 (as delivered in patch 125139-07 or later (64bit))

JDK and JRE 5.0 Update 15 is available for download at the following link:

http://java.sun.com/javase/downloads/index_jdk5.jsp

JDK 5.0 Update 15 for Solaris is available in the following patches:

* J2SE 5.0: update 15 (as delivered in patch 118666-16 or later)
* J2SE 5.0: update 15 (as delivered in patch 118667-16 or later (64bit))
* J2SE 5.0_x86: update 15 (as delivered in patch 118668-16 or later)
* J2SE 5.0_x86: update 15 (as delivered in patch 118669-16 or later (64bit))

SDK and JRE 1.4.2 is available for download at:

http://java.sun.com/j2se/1.4.2/download.html

SDK and JRE 1.3.1 for Solaris 8 is available for download at:

http://java.sun.com/j2se/1.3/download.html

The vendor's advisory is available at:

http://sunsolve.sun.com/search/document.do?assetkey=1-66-233324-1

Vendor URL:  sunsolve.sun.com/search/document.do?assetkey=1-66-233324-1 (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (Solaris - SunOS), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Mar 7 2008 (Red Hat Issues Fix) Java Plug-in Bug Lets Remote Users Execute Local Applications on the Target User's System
Red Hat has released a fix for Red Hat Enterprise Linux Extras 4 and 5.
Apr 3 2008 (Red Hat Issues Fix) Java Plug-in Bug Lets Remote Users Execute Local Applications on the Target User's System
Red Hat has released a fix for java-1.5.0-ibm for Red Hat Enterprise Linux Extras 4 and 5.
Apr 16 2008 (BEA Issues Fix for JRockit) Java Plug-in Bug Lets Remote Users Execute Local Applications on the Target User's System
BEA has issued a fix for JRockit.
May 19 2008 (Red Hat Issues Fix) Java Plug-in Bug Lets Remote Users Execute Local Applications on the Target User's System
Red Hat has released a fix Red Hat Enterprise Linux 5 Supplementary.
Jun 18 2008 (VMware Issues Fix for ESX Server) Java Plug-in Bug Lets Remote Users Execute Local Applications on the Target User's System
VMware has issued a fix for VMware ESX Server.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC