Lucene search

K
certCERTVU:931684
HistoryDec 02, 2005 - 12:00 a.m.

Sun Java Management Extensions privilege escalation vulnerability

2005-12-0200:00:00
www.kb.cert.org
22

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.073

Percentile

94.1%

Overview

A vulnerability in the Sun Java Management Extensions API may allow a remote attacker to execute arbitrary code.

Description

According to Sun Microsystems:

Java Management Extensions (JMX) technology provides the tools for building distributed, Web-based, modular and dynamic solutions for managing and monitoring devices, applications, and service-driven networks.

An unspecified vulnerability in the JMX API may allow an untrusted Java applet to execute elevated privileges. For more information, please refer to Sun Alert 102017.


Impact

A remote attacker may be able to execute arbitrary code.


Solution

Upgrade Java
Sun addressed this issue in the Java Development Kit (JDK) and the Java Runtime Environment (JRE) 5.0 Update 4.


Do not access Java Applets from untrusted sources

Attackers must deliver a malicious Java applet to a vulnerable system in order to take advantage of this vulnerability. By only accessing Java applets from known and trusted sources the chances of exploitation are reduced.

Disable Java in web browser

Java applets are commonly executed within a web browser. Disabling Java within the web browser may prevent an attacker from delivering a malicious applet to a vulnerable system.


Vendor Information

931684

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Sun Microsystems, Inc. __ Affected

Notified: November 29, 2005 Updated: November 30, 2005

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see <http://sunsolve.sun.com/search/document.do?assetkey=1-26-102017-1&gt;.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23931684 Feedback>).

CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A

References

Acknowledgements

This vulnerability was reported by Sun Microsystems. Sun credits Adam Gowdiak with providing information regarding this issue.

This document was written by Jeff Gennari.

Other Information

CVE IDs: CVE-2005-3904
Severity Metric: 9.00 Date Public:

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.073

Percentile

94.1%

Related for VU:931684