Lucene search

K
certCERTVU:652636
HistoryFeb 09, 2006 - 12:00 a.m.

Sun Java Web Start security bypass vulnerability

2006-02-0900:00:00
www.kb.cert.org
8

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:P/A:N

0.007 Low

EPSS

Percentile

80.7%

Overview

A vulnerability in the Sun Java Web Start may allow an untrusted Java applet or application to bypass security restrictions and execute arbitrary code.

Description

Java Web Start technology allows Java applications and applets to be executed via HTTP. Remote applications and applets are specified using the Java Network Launching Protocol (JNLP). The JNLP specification describes the resouces, parameters, and permissions needed to execute the remote application or applet. By default, Java Web Start applications and applets are restricted in what they can access on a host machine. However, an unspecified vulnerability in Java Web Start may allow a Java applet or application to bypass the Java Web Start security restrictions. Once the security restrictions are bypassed, the malicious applet may be able to access and manipulate system resources.

For more information regarding this vulnerability, please refer to Sun Alert 102170.


Impact

By convincing a user to run a specially crafted Java applet or application via Java Web Start, a remote, unauthenticated attacker may be able to execute arbitrary code.


Solution

Upgrade
This Java Web Start issue was corrected in Java 2 Platform Standard Edition 5.0 Update 6 and later.


Disable Java Web Start

Sun Alert 102170 provides information on how to disable Java Web Start in different web browsers.


Vendor Information

652636

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Sun Microsystems, Inc. __ Affected

Updated: February 09, 2006

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see <http://sunsolve.sun.com/search/document.do?assetkey=1-26-102170-1&gt;.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23652636 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported in Sun Alert 102170. Sun credits Peter Csepely with providing information about this issue.

This document was written by Jeff Gennari.

Other Information

CVE IDs: CVE-2006-0613
Severity Metric: 10.94 Date Public:

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:P/A:N

0.007 Low

EPSS

Percentile

80.7%

Related for VU:652636