TITLE:
Sun Java JRE "reflection" APIs Sandbox Security Bypass
Vulnerabilities

SECUNIA ADVISORY ID:
SA18760

VERIFY ADVISORY:
http://secunia.com/advisories/18760/

CRITICAL:
Highly critical

IMPACT:
System access

WHERE:
>From remote

SOFTWARE:
Sun Java JDK 1.5.x
http://secunia.com/product/4621/
Sun Java JRE 1.3.x
http://secunia.com/product/87/
Sun Java JRE 1.4.x
http://secunia.com/product/784/
Sun Java JRE 1.5.x / 5.x
http://secunia.com/product/4228/
Sun Java SDK 1.3.x
http://secunia.com/product/1660/
Sun Java SDK 1.4.x
http://secunia.com/product/1661/

DESCRIPTION:
Seven vulnerabilities have been reported in Sun Java JRE (Java 
Runtime Environment), which potentially can be exploited by 
malicious people to compromise a user's system.

The vulnerabilities are caused due to various unspecified 
errors in the "reflection" APIs. This may be exploited by a 
malicious, untrusted applet to read and write local files or 
execute local applications.

The following releases are affected by one or more of the seven
vulnerabilities on Windows, Solaris, and Linux platforms:
* JDK and JRE 5.0 Update 5 and prior
* SDK and JRE 1.4.2_09 and prior
* SDK and JRE 1.3.1_16 and prior

SOLUTION:
Update to the fixed versions.

JDK and JRE 5.0:
Update to JDK and JRE 5.0 Update 6 or later.
http://java.sun.com/j2se/1.5.0/download.jsp

SDK and JRE 1.4.x:
Update to SDK and JRE 1.4.2_10 or later.
http://java.sun.com/j2se/1.4.2/download.html

SDK and JRE 1.3.x:
Update to SDK and JRE 1.3.1_17 or later.
http://java.sun.com/j2se/1.3/download.html

ORIGINAL ADVISORY:
Sun Microsystems:
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102171-1
============= PCWorks Mailing List =================
Don't see your post? Check our posting guidelines &
make sure you've followed proper posting procedures,
http://pcworkers.com/rules.htm
Contact list owner <[EMAIL PROTECTED]>
Unsubscribing and other changes: http://pcworkers.com
=====================================================

Reply via email to