CERT-In Vulnerability Note
CIVN-2005-0117
JAVA JRE and SDK Multiple Privilege Escalation Vulnerability
Original Issue Date:December 20, 2005
Severity Rating: HIGH
Systems Affected
Sun Java JDK 1.5.x Windows, Solaris and Linux Sun Java JRE 1.3.x Windows, Solaris and Linux Sun Java JRE 1.4.x Windows, Solaris and Linux Sun Java JRE 1.5.x / 5.x Windows, Solaris and Linux Sun Java SDK 1.3.x Windows, Solaris and Linux Sun Java SDK 1.4.x Windows, Solaris and Linux
Overview
Multiple vulnerabilities have been reported in Sun Java Runtime Environment JRE and Java Software Development Kit SDK , which could allow remote attackers to bypass security settings and elevate privileges.
Description
The reflection API represents, or reflects, the classes, interfaces, and objects in the current Java Virtual Machine. A vulnerability exits in JRE due to unspecified errors related to the implementation of "reflection" APIs in JRE. This vulnerability could be exploited by malicious user to read, write and execute local files or applications by convincing a target user to visit a specially crafted web page.
A vulnerability exits in JMX due to an error in the implementation of Java Management Extensions JMX API. This vulnerability could be exploited by attackers to read, write and execute local files and applications with the privileges of the current user. A vulnerability exits in JRE due to an unspecified error in the Java Runtime Environment while handling specially crafted applets. This vulnerability could be exploited by attackers to read and write local files or execute local applications with the privileges of the current user. Note: SDK and JRE 1.3.x are not vulnerable for second and third vulnerability.
Workaround
Do not access Java Applets from untrusted websites Disable Java in web browser
Solution
Upgrade to JDK and JRE 5.0 Update 4 or later: http://java.sun.com/j2se/1.5.0/download.jsp Upgrade to SDK and JRE 1.4.2_09 or later : http://java.sun.com/j2se/1.4.2/download.html Upgrade to SDK and JRE 1.3.1_16 or later : http://java.sun.com/j2se/1.3/download.html
References
SUN
http://java.sun.com/products/JavaManagement/
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102017-1
US-CERT
http://www.kb.cert.org/vuls/id/974188
http://www.kb.cert.org/vuls/id/931684
http://www.kb.cert.org/vuls/id/355284
IBM
http://www1.ibm.com/support/docview.wss?uid=swg21225628
Security focus BID 15615
http://www.securityfocus.com/bid/15615/
Secunia
http://secunia.com/advisories/18092/
FrSIRT
http://www.frsirt.com/english/advisories/2005/2636
CVE Name
CAN-2005-3905
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-2436857
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|