Lucene search

K
certCERTVU:336105
HistoryOct 05, 2007 - 12:00 a.m.

Sun Java JRE vulnerable to unauthorized network access

2007-10-0500:00:00
www.kb.cert.org
16

4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:P/A:N

0.027 Low

EPSS

Percentile

90.3%

Overview

The Sun Java Runtime Environment (JRE) contains a vulnerability that may allow unintended access to network resources.

Description

The Sun Java Runtime Environment (JRE) allows users to run Java applications in a browser or as standalone programs. Sun has made the JRE available for multiple operating systems.

Per Sunsolve Document ID 103079:

A vulnerability in the Java Runtime Environment (JRE) with applet caching may allow an untrusted applet that is downloaded from a malicious website to make network connections to network services on machines other than the one that the applet was downloaded from. This may allow network resources (such as web pages) and vulnerabilities (that exist on these network services) which are not otherwise normally accessible to be accessed or exploited.

The following java products are affected by this vulnerability:

JDK and JRE 6 Update 2 and earlier
JDK and JRE 5.0 Update 12 and earlier
SDK and JRE 1.4.2_15 and earlier
SDK and JRE 1.3.1_20 and earlier


Impact

An attacker may be able to run a Java applet on a vulnerable system to gain access to network connections to resources not otherwise accessible and expose vulnerabilitites within those network resources.


Solution

Upgrade
Sun has released an upgrade to address this issue. See Sunsolve Document ID 103079 for more details. To adjust the JRE update settings, see the update section of the Java deployment guide.


Disable Java

Disabling the Java browser plugin may prevent a malicious webpage from exploiting this vulnerability. See the Securing Your Web Browser for instructions on how to disable Java in your browser.

Use NoScript
Using the Mozilla Firefox NoScript extension to whitelist web sites that can run scripts and access installed plugins will mitigate this vulnerability. See the NoScript FAQ for more information.


Vendor Information

336105

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Sun Microsystems, Inc. __ Affected

Updated: October 05, 2007

Status

Affected

Vendor Statement

Sun has released an upgrade to address this issue. See Sunsolve Document ID 103079 for more details.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported in Sun Alert 103079. Sun credits Billy Rios of VeriSign with providing information about this issue.

This document was written by Joseph Pruszynski.

Other Information

CVE IDs: CVE-2007-5232
Severity Metric: 11.47 Date Public:

4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:P/A:N

0.027 Low

EPSS

Percentile

90.3%