TITLE: Sun Java JRE "reflection" APIs Sandbox Security Bypass Vulnerabilities
SECUNIA ADVISORY ID: SA18760 VERIFY ADVISORY: http://secunia.com/advisories/18760/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote SOFTWARE: Sun Java JDK 1.5.x http://secunia.com/product/4621/ Sun Java JRE 1.3.x http://secunia.com/product/87/ Sun Java JRE 1.4.x http://secunia.com/product/784/ Sun Java JRE 1.5.x / 5.x http://secunia.com/product/4228/ Sun Java SDK 1.3.x http://secunia.com/product/1660/ Sun Java SDK 1.4.x http://secunia.com/product/1661/ DESCRIPTION: Seven vulnerabilities have been reported in Sun Java JRE (Java Runtime Environment), which potentially can be exploited by malicious people to compromise a user's system. The vulnerabilities are caused due to various unspecified errors in the "reflection" APIs. This may be exploited by a malicious, untrusted applet to read and write local files or execute local applications. The following releases are affected by one or more of the seven vulnerabilities on Windows, Solaris, and Linux platforms: * JDK and JRE 5.0 Update 5 and prior * SDK and JRE 1.4.2_09 and prior * SDK and JRE 1.3.1_16 and prior SOLUTION: Update to the fixed versions. JDK and JRE 5.0: Update to JDK and JRE 5.0 Update 6 or later. http://java.sun.com/j2se/1.5.0/download.jsp SDK and JRE 1.4.x: Update to SDK and JRE 1.4.2_10 or later. http://java.sun.com/j2se/1.4.2/download.html SDK and JRE 1.3.x: Update to SDK and JRE 1.3.1_17 or later. http://java.sun.com/j2se/1.3/download.html ORIGINAL ADVISORY: Sun Microsystems: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102171-1 ============= PCWorks Mailing List ================= Don't see your post? Check our posting guidelines & make sure you've followed proper posting procedures, http://pcworkers.com/rules.htm Contact list owner <[EMAIL PROTECTED]> Unsubscribing and other changes: http://pcworkers.com =====================================================
