SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Oracle Java Plug-in Vendors:   Sun
Java Plug-in Bugs Lets Remote Users Gain Privileges
SecurityTracker Alert ID:  1021920
SecurityTracker URL:  http://securitytracker.com/id/1021920
CVE Reference:   CVE-2009-1103, CVE-2009-1104, CVE-2009-1105, CVE-2009-1106, CVE-2009-1107   (Links to External Site)
Updated:  Mar 26 2009
Original Entry Date:  Mar 26 2009
Impact:   Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Host/resource access via network, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Prior to 6 Update 13
Description:   Several vulnerabilities were reported in Java Plug-in. A remote user can read/write files and execute applications on the target user's system.

A remote user can create an applet that, when loaded by the target user, will read and write local files or execute applications on the target system with the privileges of the target user [CVE-2009-1103].

A remote user can create an applet that, when loaded from the localhost interface, will connect to arbitrary ports on the target system [CVE-2009-1104].

A remote user can create an applet that, when loaded by the target user, will load on a prior version of JRE (if permitted to run). JavaScript code hosted on the same web page as the applet can exploit known vulnerabilities in the requested version of JRE [CVE-2009-1105].

A remote user can create an applet that, when loaded by the target user, will trigger a flaw in the parsing of 'crossdomain.xml' files to connect to arbitrary sites that provide a 'crossdomain.xml' file instead of sites that allow the domain that the applet is running on [CVE-2009-1106].

A remote user can create a signed applet that, when loaded by the target user, will obscure the contents of the security dialog. A user may be convinced to trust the applet [CVE-2009-1107].

Gregory Fleischer reported one of these vulnerabilities. Michael Scheirl reported one of these vulnerabilities.

Impact:   A remote user can obtain privileges on the target system.
Solution:   The vendor has issued the following fixes for Windows, Solaris, and Linux:

* JDK and JRE 6 Update 13 or later
* JDK and JRE 5.0 Update 18 or later

and in the following Java SE for Business release for Windows, Solaris, and Linux:

* SDK and JRE 1.4.2_20 or later

and in the following Java SE release for Windows and Solaris:

* SDK and JRE 1.3.1_25 or later

CR 6724331 is addressed in the following Java SE and Java SE for Business releases for Windows, Solaris, and Linux:

* JDK and JRE 6 Update 13 or later
* JDK and JRE 5.0 Update 18 or later

and in the following Java SE for Business release for Windows, Solaris, and Linux:

* SDK and JRE 1.4.2_20 or later

CR 6706490 and 6798948 are addressed in the following Java SE and Java SE for Business releases for Windows, Solaris, and Linux:

* JDK and JRE 6 Update 13 or later

CR 6782871 is addressed in the following Java SE and Java SE for Business releases for Windows, Solaris, and Linux:

* JDK and JRE 6 Update 13 or later
* JDK and JRE 5.0 Update 18 or later

Java SE releases are available at:

JDK and JRE 6 Update 13:

http://java.sun.com/javase/downloads/index.jsp

JRE 6 Update 13:

http://java.com/

through the Java Update tool for Microsoft Windows users.

JDK 6 Update 13 for Solaris is available in the following patches:

* Java SE 6 Update 13 (as delivered in patch 125136-14 or later)
* Java SE 6 Update 13 (as delivered in patch 125137-14 or later (64bit))
* Java SE 6 x86 Update 13 (as delivered in patch 125138-14 or later)
* Java SE 6 x86 Update 13 (as delivered in patch 125139-14 or later (64bit))

JDK and JRE 5.0 Update 18:

http://java.sun.com/javase/downloads/index_jdk5.jsp

JDK 5.0 Update 18 for Solaris is available in the following patches:

* J2SE 5.0 Update 18 (as delivered in patch 118666-19 or later)
* J2SE 5.0 Update 18 (as delivered in patch 118667-19 or later (64bit))
* J2SE 5.0 x86 Update 18 (as delivered in patch 118668-19 or later)
* J2SE 5.0 x86 Update 18 (as delivered in patch 118669-19 or later (64bit))

Java SE for Business releases are available at:

http://www.sun.com/software/javaseforbusiness/getit_download.jsp

The vendor's advisory is available at:

http://sunsolve.sun.com/search/document.do?assetkey=1-66-254611-1

Vendor URL:  sunsolve.sun.com/search/document.do?assetkey=1-66-254611-1 (Links to External Site)
Cause:   Not specified
Underlying OS:  Linux (Any), UNIX (Solaris - SunOS), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Mar 26 2009 (Red Hat Issues Fix) Java Plug-in Bugs Lets Remote Users Gain Privileges
Red Hat has released a fix for java-1.5.0-sun for Red Hat Enterprise Linux 4 and 5.
Mar 26 2009 (Red Hat Issues Fix) Java Plug-in Bugs Lets Remote Users Gain Privileges
Red Hat has released a fix for java-1.6.0-sun for Red Hat Enterprise Linux 4 and 5.
May 19 2009 (Red Hat Issues Fix) Java Plug-in Bugs Lets Remote Users Gain Privileges
Red Hat has released a fix for java-1.5.0-ibm for Red Hat Enterprise Linux 4 and 5.
Oct 16 2009 (VMware Issues Fix for ESX Server) Java Plug-in Bugs Lets Remote Users Gain Privileges
VMware has issued a fix for ESX Server 3.0.3 and 3.5.
May 20 2010 (Apple Issues Fix) Java Plug-in Bugs Lets Remote Users Gain Privileges
Apple has issued a fix for Java for Mac OS X 10.6.3.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC