Sun Java Multiple Code Execution and Security Bypass Vulnerabilities
RISK: Medium Risk
Multiple vulnerabilities have been identified in Sun Java, which could be exploited by attackers to bypass security restrictions, disclose sensitive information, cause a denial of service, or compromise an affected system.
1. An errors when decoding DER encoded data and parsing HTTP headers, which may allow a remote client to cause the JRE on the server to run out of memory, creating a denial of service condition.
2. An error when verifying HMAC digests, which may allow authentication to be bypassed via a forged digital signature.
3. An error in the Java Web Start Installer, which may be leveraged to allow an untrusted Java Web Start application to run as a trusted application and execute arbitrary code.
4. An error in the Java Runtime Environment Deployment Toolkit, which could be exploited by malicious web sites to execute arbitrary commands.
5. An error in the Java Runtime Environment Java Update mechanism, when running on non-English versions of the Windows operating system, not updating the JRE when a new version is available.
Various buffer and integer overflow errors exist within the processing of malformed audio and image files, which may allow an untrusted applet or Java Web Start application to escalate privileges and execute arbitrary code or read/write local files.
Impact
- Denial of Service
- Remote Code Execution
- Security Restriction Bypass
- Information Disclosure
System / Technologies affected
- Sun Java JDK and JRE version 6 Update 16 and prior
- Sun Java JDK and JRE version 5.0 Update 21 and prior
- Sun Java SDK and JRE version 1.4.2_23 and prior
- Sun Java SDK and JRE version 1.3.1_26 and prior
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
Upgrade to Sun JDK and JRE 6 Update 17 or later :
http://java.sun.com/javase/downloads/index.jspUpgrade to Sun JDK and JRE 5.0 Update 22 or later :
http://java.sun.com/javase/downloads/index_jdk5.jspUpgrade to Sun SDK and JRE 1.4.2_24 or later :
http://java.sun.com/j2se/1.4.2/download.htmlUpgrade to Sun SDK and JRE 1.3.1_27 or later :
http://java.sun.com/j2se/1.3/download.htmlJava SE for Business :
http://www.sun.com/software/javaseforbusiness/getit_download.jspApple Mac OS X 10.6Apply Java Update 1 :
http://support.apple.com/kb/DL972Apple Mac OS X 10.5Apply Java Update 6 :
http://support.apple.com/kb/DL971
Vulnerability Identifier
- CVE-2009-2843
- CVE-2009-3728
- CVE-2009-3864
- CVE-2009-3865
- CVE-2009-3866
- CVE-2009-3867
- CVE-2009-3868
- CVE-2009-3869
- CVE-2009-3871
- CVE-2009-3872
- CVE-2009-3873
- CVE-2009-3874
- CVE-2009-3875
- CVE-2009-3876
- CVE-2009-3877
- CVE-2009-3884
Source
Related Link
- http://www.vupen.com/english/advisories/2009/3131
- http://secunia.com/advisories/37231/
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-270476-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-270475-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-269870-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-269869-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-269868-1
Share with