TELUS Security Labs VR - Oracle Java Web Start Command Argument Injection Remote Code Execution

Type securityvulns
Reporter Securityvulns
Modified 2012-02-15T00:00:00


Oracle Java Web Start Command Argument Injection Remote Code Execution

TSL ID: TSL20120214-01

  1. Affected Software

    Oracle Java Development Kit (JDK) 6 Update 30 and prior Oracle Java Development Kit (JDK) 7 Update 2 and prior Oracle JavaFX 2.0.2 and prior Oracle Java Runtime Environment (JRE) 6 Update 30 and prior Oracle Java Runtime Environment (JRE) 7 Update 2 and prior


  1. Vulnerability Summary

A Java Web Start vulnerability exists in Oracle Java. The vulnerability can be exploited by remote unauthenticated attackers to execute arbitrary code on a vulnerable system.

  1. Vulnerability Analysis

Java Web Start enables the deployment and execution of remote applications on a local system. The instructions for application execution are specified in a Java Network Launching Protocol (JNLP) file. An input validation vulnerability exists during the processing of execution parameters. A remote attacker can exploit this vulnerability by enticing a target user to open a crafted JNLP file. In a successful attack, the attacker can execute arbitrary code within the context of the affected user.

  1. Vulnerability Detection

TELUS Security Labs has confirmed the vulnerability in:

Oracle Java Development Kit (JDK) 6 update 28
Oracle Java Development Kit (JDK) 6 update 29
Oracle Java Development Kit (JDK) 6 update 30
  1. Workaround

There is no known workaround.

  1. Vendor Response

Patches have been made available by the vendor to eliminate this vulnerability:

  1. Disclosure Timeline

2011-08-23 Vulnerability reported to the vendor 2011-08-24 Vendor responds. Investigation into vulnerability is underway 2011-09-22 Vendor updates TSL on internal status 2011-10-13 Vendor acknowledges error and commits to fix it 2011-10-13 TSL acknowledges update 2011-12-27 Vendor commits to release fix in an upcoming CPU 2012-02-10 Vendor provides advance notice of patch date 2012-02-10 TSL acknowledges update 2012-02-14 Vendor releases advisory and patch 2012-02-14 Published TSL advisory

  1. Credits

Vulnerability Research Team, TELUS Security Labs

  1. References



  1. About TELUS Security Labs

TELUS Security Labs, formerly Assurent Secure Technologies, is the leading provider of security research. Our research services include:

* Vulnerability Research
* Malware Research
* Signature Development
* Shellcode Exploit Development
* Application Protocols
* Product Security Testing
* Security Content Development (parsers, reports, alerts)

TELUS Security Labs provides a specialized portfolio of services to assist security product vendors with newly discovered commercial product vulnerabilities and malware attacks. Many of our services are provided on a subscription basis to reduce research costs for our customers. Over 50 of the world's leading security product vendors rely on TELUS Security Labs research.