Sun Java Web Start Untrusted Application Arbitrary File Overwrite

ERCOLINO

Membro dello Staff
Amministratore
Registrato
3 Marzo 2003
Messaggi
252.592
Località
Torino
Secunia Advisory: SA25823
Release Date: 2007-06-29

Critical: Highly critical
Impact: Security Bypass
Manipulation of data
Where: From remote
Solution Status: Vendor Patch

Software: Java Web Start 1.x
Sun Java JDK 1.5.x
Sun Java JRE 1.4.x
Sun Java JRE 1.5.x / 5.x
Sun Java SDK 1.4.x




Description:
A vulnerability has been reported in Sun Java Web Start, which can be exploited by malicious people to bypass certain security restrictions.

The vulnerability is caused due to an unspecified error in Java Web Start and can be exploited by an untrusted application to grant itself permissions to overwrite any file that is writable by the user running the application. This can further be exploited to overwrite the user's ".java.policy" file allowing the application to invoke applets or Java Web Start applications.

The vulnerability affects Java Web Start in JDK and JRE 5.0 Update 11 and earlier and Java Web Start in SDK and JRE 1.4.2_13 and earlier for the Windows platform.

Secunia has constructed the Secunia Software Inspector, which you can use to check if your system is vulnerable:
http://secunia.com/software_inspector/

Solution:
Apply updates.

Java Web Start in JDK and JRE 5.0 Update 12 or later

http://java.sun.com/j2se/1.5.0/download.jsp

Java Web Start in SDK and JRE 1.4.2_14 or later
http://java.sun.com/j2se/1.4.2/download.html



Bollettino Secunia
 
Indietro
Alto Basso