Sun Java Runtime Environment 'Calendar.readObject' Bug Lets Remote Applets Gain Elevated Privileges
|
SecurityTracker Alert ID: 1021313 |
SecurityTracker URL: http://securitytracker.com/id/1021313
|
CVE Reference:
CVE-2008-5353
(Links to External Site)
|
Updated: Dec 5 2008
|
Original Entry Date: Dec 5 2008
|
Impact:
Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): JDK and JRE 6 Update 10 and prior; JDK and JRE 5.0 Update 16 and prior; SDK and JRE 1.4.2_18 and prior
|
Description:
A vulnerability was reported in Java Runtime Environment (JRE). A remote user can read/write files and execute applications on the target user's system.
A remote user can create a specially crafted applet or application that, when loaded by the target user, will exploit a flaw in the processing of calendar objects and will read and write local files or execute applications on the target system with the privileges of the target user.
Sami Koivu reported this vulnerability.
|
Impact:
A remote user can create an applet or application that, when loaded by the target user, will read/write files and execute applications on the target user's system with the privileges of the target user.
|
Solution:
The vendor has issued the following Java SE and Java SE for Business releases for Solaris, Windows and Linux:
* JDK and JRE 6 Update 11 or later
* JDK and JRE 5.0 Update 17 or later
* SDK and JRE 1.4.2_19 or later
The vendor's advisory is available at:
http://sunsolve.sun.com/search/document.do?assetkey=1-66-244991-1
|
Vendor URL: sunsolve.sun.com/search/document.do?assetkey=1-66-244991-1 (Links to External Site)
|
Cause:
Access control error
|
Underlying OS: Linux (Any), UNIX (Solaris - SunOS), Windows (Any)
|
|
Message History:
This archive entry has one or more follow-up message(s) listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|