Lucene search

K
certCERTVU:759996
HistoryFeb 09, 2006 - 12:00 a.m.

Sun Java Reflection API security bypass vulnerabilities

2006-02-0900:00:00
www.kb.cert.org
13

4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:P/A:N

0.032 Low

EPSS

Percentile

91.0%

Overview

Multiple vulnerabilities in the Sun Java Reflection API may allow an untrusted Java applet to bypass security restrictions and execute arbitrary code.

Description

The Sun Java Reflection API allows Java classes to determine information about other Java classes, such as public methods. There are seven vulnerabilities in the Java Reflection API that may allow a Java applet to bypass Java applet security restrictions. Once the security restrictions are bypassed, the malicious applet may be able to access and manipulate system resources.

For more information on the Java security model see Sun’s Java documentation, particularly the Applet Security FAQ. For more information regarding these vulnerabilities and how to correct them, please refer to Sun Alert 102171.

Note these issues are different from the one reported in VU#974188.


Impact

By convincing a user to run a specially crafted Java applet, a remote, unauthenticated attacker may be able to execute arbitrary code with the privileges of the user running the applet. Web browsers with Java support may run applets from untrusted web sites.


Solution

Upgrade
Sun Alert 102171 suggests the following solutions:

The first issue is addressed in the following releases:

* JDK and JRE 5.0 Update 4 and later
* SDK and JRE 1.4.2_09 and later
* SDK and JRE 1.3.1_17 and later

The second and third issues are addressed in the following releases:
* JDK and JRE 5.0 Update 5 and later
* SDK and JRE 1.4.2_10 and later
The fourth issue is addressed in the following releases:
* JDK and JRE 5.0 Update 5 and later
The fifth, sixth, and seventh issues are addressed in the following releases:
* JDK and JRE 5.0 Update 6 and later
J2SE 5.0 is available for download at:
* <http://java.sun.com/j2se/1.5.0/download.jsp&gt;
* http://java.com
J2SE 1.4.2 is available for download at:
* <http://java.sun.com/j2se/1.4.2/download.html&gt;

Do not access Java Applets from untrusted sources

Attackers must deliver a malicious Java applet to a vulnerable system in order to take advantage of this vulnerability. By only accessing Java applets from known and trusted sources the chances of exploitation are reduced.
**
Disable Java in web browser**

Java applets are commonly executed within a web browser. Disabling Java within the web browser may prevent an attacker from delivering a malicious applet to a vulnerable system.


Vendor Information

759996

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Sun Microsystems, Inc. __ Affected

Updated: February 09, 2006

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see <http://sunsolve.sun.com/search/document.do?assetkey=1-26-102171-1&gt;.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23759996 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

These vulnerabilities were reported in Sun Alert 102171. Sun credits Adam Gowdiak with providing information about these issues.

This document was written by Jeff Gennari.

Other Information

CVE IDs: CVE-2006-0617
Severity Metric: 4.21 Date Public:

4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:P/A:N

0.032 Low

EPSS

Percentile

91.0%