SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Oracle Java SE Vendors:   Sun
Java Runtime Environment (JRE) Virtual Machine Bug Lets Remote Users Access Files and Gain Privileges on the Target System
SecurityTracker Alert ID:  1020455
SecurityTracker URL:  http://securitytracker.com/id/1020455
CVE Reference:   CVE-2008-3107   (Links to External Site)
Updated:  Jul 10 2008
Original Entry Date:  Jul 9 2008
Impact:   Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): JRE 6 Update 6 and prior, JDK and JRE 5.0 Update 15 and prior, SDK and JRE 1.4.2_17 and prior versions.
Description:   A vulnerability was reported in the Java Runtime Environment (JRE) Virtual Machine. A remote user can access files on the target user's system or cause arbitrary applications on the target user's system to be executed.

A remote user can create a specially crafted applet or application that, when loaded by the target user, will gain access to files on the target system or execute arbitrary applications residing on the target system.

Fujitsu reported this vulnerability.

Impact:   A remote user can create an applet or application that, when loaded by the target user, will access files or execute arbitrary applications on the target user's system.
Solution:   Sun has issued the following fixes for Windows, Solaris, and Linux:

* JDK and JRE 6 Update 7 or later
* JDK and JRE 5.0 Update 16 or later
* SDK and JRE 1.4.2_18 or later

JDK and JRE 6 Update 7 is available for download at the following links:

http://java.sun.com/javase/downloads/index.jsp

http://java.com/

JRE 6 updates are available through the Java Update tool for Microsoft Windows users.

JDK 6 Update 7 for Solaris is available in the following patches:

* Java SE 6 Update 7 (as delivered in patch 125136-09 or later)
* Java SE 6 Update 7 (as delivered in patch 125137-09 or later (64bit))
* Java SE 6_x86 Update 7 (as delivered in patch 125138-09 or later)
* Java SE 6_x86 Update 7 (as delivered in patch 125139-09 or later (64bit))

JDK and JRE 5.0 Update 16 is available for download at the following link:

http://java.sun.com/javase/downloads/index_jdk5.jsp

JDK 5.0 Update 16 for Solaris is available in the following patches:

* J2SE 5.0: update 16 (as delivered in patch 118666-17)
* J2SE 5.0: update 16 (as delivered in patch 118667-17 (64bit))
* J2SE 5.0_x86: update 16 (as delivered in patch 118668-17)
* J2SE 5.0_x86: update 16 (as delivered in patch 118669-17 (64bit))

SDK and JRE 1.4.2_18 is available for download at the following link:

http://java.sun.com/j2se/1.4.2/download.html

Note: When installing a new version of the product from a source other than a Solaris patch, it is recommended that the old affected versions be removed from your system. To remove old affected versions on the Windows platform, please see:

http://java.com/en/download/help/uninstall_java.xml

The vendor's advisory is available at:

http://sunsolve.sun.com/search/document.do?assetkey=1-66-238967-1

Vendor URL:  sunsolve.sun.com/search/document.do?assetkey=1-66-238967-1 (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (Solaris - SunOS), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Jul 14 2008 (Red Hat Issues Fix) Java Runtime Environment (JRE) Virtual Machine Bug Lets Remote Users Access Files and Gain Privileges on the Target System
Red Hat has released a fix for java-1.5.0-sun on Red Hat Enterprise Linux 4 Extras and 5 Supplementary.
Jul 14 2008 (Red Hat Issues Fix) Java Runtime Environment (JRE) Virtual Machine Bug Lets Remote Users Access Files and Gain Privileges on the Target System
Red Hat has released a fix for Red Hat Enterprise Linux 5.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC