Sun Java Multiple Code Execution and Security Bypass Vulnerabilities
RISK: Medium Risk
Multiple vulnerabilities have been identified in Sun Java, which could be exploited by attackers to bypass security restrictions, disclose sensitive information, cause a denial of service, or compromise an affected system.
1. An error in the SOCKS proxy implementation, which may allow an untrusted applet or Java Web Start application to determine the username of the user running the applet or application.
2. An error in the proxy mechanism implementation, which may allow an untrusted applet or Java Web Start application to obtain browser cookies and conduct session hijacking attacks.
3. An error in the proxy mechanism implementation, which may allow an untrusted applet or Java Web Start application to make unauthorized socket or URL connections to hosts other than the origin host.
4. Due to the Java Web Start ActiveX control using vulnerable MS Active Template Libraries (ATL) and headers, which could lead to code execution.
5. An integer overflow error in the unpack200 JAR utility when unpacking applets and Java Web Start applications, which could allow code execution.
6. An integer overflow error within the parsing of JPEG images, which may allow an untrusted Java Web Start application to escalate privileges and execute arbitrary code.
7. An error within the audio system, which may allow an untrusted applet or Java Web Start application to access "java.lang.System" properties.
8. An error in the XML Digital Signature implementation.
9. An error related to the JNLPAppletLauncher, which may allow non-current versions of the JNLPAppletLauncher to be re-purposed with an untrusted Java applet, leading to arbitrary file writing on a vulnerable system.
System / Technologies affected
- Sun JDK and JRE version 6 Update 14 and prior
- Sun JDK and JRE version 5.0 Update 19 and prior
- Sun SDK and JRE version 1.4.2_21 and prior
- Sun SDK and JRE version 1.3.1_25 and prior
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
Upgrade to Sun JDK and JRE 6 Update 15 or later :
http://java.sun.com/javase/downloads/index.jspUpgrade to Sun JDK and JRE 5.0 Update 20 or later :
http://java.sun.com/javase/downloads/index_jdk5.jspUpgrade to Sun SDK and JRE 1.4.2_22 or later :
http://java.sun.com/j2se/1.4.2/download.htmlUpgrade to Sun SDK and JRE 1.3.1_26 or later :
http://java.sun.com/j2se/1.3/download.htmlJava SE for Business :
http://www.sun.com/software/javaseforbusiness/getit_download.jsp
Vulnerability Identifier
- No CVE information is available
Source
Related Link
- http://secunia.com/advisories/36159/
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-263409-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-264648-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-263488-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-263428-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-263408-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-263429-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-263490-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-263489-1
- http://www.vupen.com/english/advisories/2009/2153
Share with