Secunia Advisory: SA25823
Release Date: 2007-06-29
Critical: Highly critical
Impact: Security Bypass
Manipulation of data
Where: From remote
Solution Status: Vendor Patch
Software: Java Web Start 1.x
Sun Java JDK 1.5.x
Sun Java JRE 1.4.x
Sun Java JRE 1.5.x / 5.x
Sun Java SDK 1.4.x
Description:
A vulnerability has been reported in Sun Java Web Start, which can be exploited by malicious people to bypass certain security restrictions.
The vulnerability is caused due to an unspecified error in Java Web Start and can be exploited by an untrusted application to grant itself permissions to overwrite any file that is writable by the user running the application. This can further be exploited to overwrite the user's ".java.policy" file allowing the application to invoke applets or Java Web Start applications.
The vulnerability affects Java Web Start in JDK and JRE 5.0 Update 11 and earlier and Java Web Start in SDK and JRE 1.4.2_13 and earlier for the Windows platform.
Secunia has constructed the Secunia Software Inspector, which you can use to check if your system is vulnerable:
http://secunia.com/software_inspector/
Solution:
Apply updates.
Java Web Start in JDK and JRE 5.0 Update 12 or later
http://java.sun.com/j2se/1.5.0/download.jsp
Java Web Start in SDK and JRE 1.4.2_14 or later
http://java.sun.com/j2se/1.4.2/download.html
Bollettino Secunia
Release Date: 2007-06-29
Critical: Highly critical
Impact: Security Bypass
Manipulation of data
Where: From remote
Solution Status: Vendor Patch
Software: Java Web Start 1.x
Sun Java JDK 1.5.x
Sun Java JRE 1.4.x
Sun Java JRE 1.5.x / 5.x
Sun Java SDK 1.4.x
Description:
A vulnerability has been reported in Sun Java Web Start, which can be exploited by malicious people to bypass certain security restrictions.
The vulnerability is caused due to an unspecified error in Java Web Start and can be exploited by an untrusted application to grant itself permissions to overwrite any file that is writable by the user running the application. This can further be exploited to overwrite the user's ".java.policy" file allowing the application to invoke applets or Java Web Start applications.
The vulnerability affects Java Web Start in JDK and JRE 5.0 Update 11 and earlier and Java Web Start in SDK and JRE 1.4.2_13 and earlier for the Windows platform.
Secunia has constructed the Secunia Software Inspector, which you can use to check if your system is vulnerable:
http://secunia.com/software_inspector/
Solution:
Apply updates.
Java Web Start in JDK and JRE 5.0 Update 12 or later
http://java.sun.com/j2se/1.5.0/download.jsp
Java Web Start in SDK and JRE 1.4.2_14 or later
http://java.sun.com/j2se/1.4.2/download.html
Bollettino Secunia