GLSA Bodhisattva
Joined: 13 Jun 2003 Posts: 4087 Location: Dresden, Germany
|
Posted: Thu Mar 24, 2005 10:05 pm Post subject: [ GLSA 200503-28 ] Sun Java: Web Start argument injection vu |
|
|
Gentoo Linux Security Advisory
Title: Sun Java: Web Start argument injection vulnerability (GLSA 200503-28)
Severity: normal
Exploitable: remote
Date: March 24, 2005
Updated: May 22, 2006
Bug(s): #85804
ID: 200503-28
Synopsis
Java Web Start JNLP files can be abused to evade sandbox restriction and execute arbitrary code.
Background
Sun provides implementations of Java Development Kits (JDK) and Java Runtime Environments (JRE). These implementations provide the Java Web Start technology that can be used for easy client-side deployment of Java applications.
Affected Packages
Package: dev-java/sun-jdk
Vulnerable: < 1.4.2.07
Unaffected: >= 1.4.2.07
Unaffected: < 1.4.2
Architectures: All supported architectures
Package: dev-java/sun-jre-bin
Vulnerable: < 1.4.2.07
Unaffected: >= 1.4.2.07
Unaffected: < 1.4.2
Architectures: All supported architectures
Description
Jouko Pynnonen discovered that Java Web Start contains a vulnerability in the way it handles property tags in JNLP files.
Impact
By enticing a user to open a malicious JNLP file, a remote attacker could pass command line arguments to the Java Virtual machine, which can be used to bypass the Java "sandbox" and to execute arbitrary code with the permissions of the user running the application.
Workaround
There is no known workaround at this time.
Resolution
All Sun JDK users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=dev-java/sun-jdk-1.4.2.07" | All Sun JRE users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=dev-java/sun-jre-bin-1.4.2.07" |
References
Jouko Pynnonen advisory
Sun Microsystems Alert Notification
CVE-2005-0836
Last edited by GLSA on Wed Sep 10, 2008 4:18 am; edited 4 times in total |
|