Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200701-15] Sun JDK/JRE: Multiple vulnerabilities


Vulnerability Assessment Details

[GLSA-200701-15] Sun JDK/JRE: Multiple vulnerabilities

Vulnerability Assessment Summary
Sun JDK/JRE: Multiple vulnerabilities

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200701-15
(Sun JDK/JRE: Multiple vulnerabilities)


Chris Evans has discovered multiple buffer overflows in Sun JDK and Sun
JRE possibly related to various AWT or font layout functions. Tom
Hawtin has discovered an unspecified vulnerability in Sun JDK and Sun
JRE relating to unintended applet data access. He has also discovered
multiple other unspecified vulnerabilities in Sun JDK and Sun JRE
permiting unintended Java applet or application resource acquisition.

Impact

A possible hacker could entice a user to run a specially crafted Java applet
or application that could read, write, or execute local files with the
rights of the user running the JVM
access data maintained in other
Java applets
or escalate the rights of the currently running Java
applet or application permiting for unauthorized access to system
resources.

Workaround

There is no known workaround at this time.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6731
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6736
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6737
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6745


Solution:
All Sun Java Development Kit users should upgrade to the latest
version:
# emerge --sync
# emerge --ask --oneshot --verbose "dev-java/sun-jdk"
All Sun Java Runtime Environment users should upgrade to the latest
version:
# emerge --sync
# emerge --ask --oneshot --verbose "dev-java/sun-jre-bin"


Network Security Threat Level: Medium


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2007 Michel Arboi

Cables, Connectors

JDS Uni-phase JSPR21S002304 2 Gbit/s GBIC SFP 52P6539 212192-002 229204-001
$1.9
JDS Uni-phase JSPR21S002304 2 Gbit/s GBIC SFP 52P6539 212192-002 229204-001 pictureCisco compatible 10GBase-LR SFP+ Transceiver (SMF, 1310nm,10km, LC, DOM)
$541.37
Cisco compatible 10GBase-LR SFP+ Transceiver (SMF, 1310nm,10km, LC, DOM) pictureCisco Syst. 1000BASE-T SFP ( GLC-T= )
$353.09
Cisco Syst. 1000BASE-T SFP ( GLC-T= ) pictureProsafe 1000base-T Sfp Rj45 Gbic
$178.55
Prosafe 1000base-T Sfp Rj45 Gbic picture


Discussions

No Discussions have been posted on this vulnerability.