Skip to main content

Sun Java Multiple Code Execution and Security Bypass Vulnerabilities

Last Update Date: 28 Jan 2011 Release Date: 6 Aug 2009 4486 Views

RISK: Medium Risk

Multiple vulnerabilities have been identified in Sun Java, which could be exploited by attackers to bypass security restrictions, disclose sensitive information, cause a denial of service, or compromise an affected system.

1. An error in the SOCKS proxy implementation, which may allow an untrusted applet or Java Web Start application to determine the username of the user running the applet or application.

2. An error in the proxy mechanism implementation, which may allow an untrusted applet or Java Web Start application to obtain browser cookies and conduct session hijacking attacks.

3. An error in the proxy mechanism implementation, which may allow an untrusted applet or Java Web Start application to make unauthorized socket or URL connections to hosts other than the origin host.

4. Due to the Java Web Start ActiveX control using vulnerable MS Active Template Libraries (ATL) and headers, which could lead to code execution.

5. An integer overflow error in the unpack200 JAR utility when unpacking applets and Java Web Start applications, which could allow code execution.

6. An integer overflow error within the parsing of JPEG images, which may allow an untrusted Java Web Start application to escalate privileges and execute arbitrary code.

7. An error within the audio system, which may allow an untrusted applet or Java Web Start application to access "java.lang.System" properties.

8. An error in the XML Digital Signature implementation.

9. An error related to the JNLPAppletLauncher, which may allow non-current versions of the JNLPAppletLauncher to be re-purposed with an untrusted Java applet, leading to arbitrary file writing on a vulnerable system.


System / Technologies affected

  • Sun JDK and JRE version 6 Update 14 and prior
  • Sun JDK and JRE version 5.0 Update 19 and prior
  • Sun SDK and JRE version 1.4.2_21 and prior
  • Sun SDK and JRE version 1.3.1_25 and prior

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

Upgrade to Sun JDK and JRE 6 Update 15 or later :
http://java.sun.com/javase/downloads/index.jsp

Upgrade to Sun JDK and JRE 5.0 Update 20 or later :
http://java.sun.com/javase/downloads/index_jdk5.jsp

Upgrade to Sun SDK and JRE 1.4.2_22 or later :
http://java.sun.com/j2se/1.4.2/download.html

Upgrade to Sun SDK and JRE 1.3.1_26 or later :
http://java.sun.com/j2se/1.3/download.html

Java SE for Business :
http://www.sun.com/software/javaseforbusiness/getit_download.jsp


Vulnerability Identifier

  • No CVE information is available

Source


Related Link