Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200701-15] Sun JDK/JRE: Multiple vulnerabilities


Vulnerability Assessment Details

[GLSA-200701-15] Sun JDK/JRE: Multiple vulnerabilities

Vulnerability Assessment Summary
Sun JDK/JRE: Multiple vulnerabilities

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200701-15
(Sun JDK/JRE: Multiple vulnerabilities)


Chris Evans has discovered multiple buffer overflows in Sun JDK and Sun
JRE possibly related to various AWT or font layout functions. Tom
Hawtin has discovered an unspecified vulnerability in Sun JDK and Sun
JRE relating to unintended applet data access. He has also discovered
multiple other unspecified vulnerabilities in Sun JDK and Sun JRE
permiting unintended Java applet or application resource acquisition.

Impact

A possible hacker could entice a user to run a specially crafted Java applet
or application that could read, write, or execute local files with the
rights of the user running the JVM
access data maintained in other
Java applets
or escalate the rights of the currently running Java
applet or application permiting for unauthorized access to system
resources.

Workaround

There is no known workaround at this time.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6731
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6736
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6737
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6745


Solution:
All Sun Java Development Kit users should upgrade to the latest
version:
# emerge --sync
# emerge --ask --oneshot --verbose "dev-java/sun-jdk"
All Sun Java Runtime Environment users should upgrade to the latest
version:
# emerge --sync
# emerge --ask --oneshot --verbose "dev-java/sun-jre-bin"


Network Security Threat Level: Medium


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2007 Michel Arboi

Cables, Connectors

DELL POWEREDGE R730 LFF 8 BAY E5-2699V3 2.3GHZ 192GB 5 X 146GB 15K SAS H330
$10179.0
DELL POWEREDGE R730 LFF 8 BAY E5-2699V3 2.3GHZ 192GB 5 X 146GB 15K SAS H330 pictureDELL POWEREDGE R730 8 BAY E5-2630V4 2.2GHZ 32GB 4 X 1TB SAS H730
$3999.0
DELL POWEREDGE R730 8 BAY E5-2630V4 2.2GHZ 32GB 4 X 1TB SAS H730 pictureDELL POWEREDGE R730 8 BAY TWO E5-2699V4 2.2GHZ 512GB 2 X 500GB SAS H730
$17149.0
DELL POWEREDGE R730 8 BAY TWO E5-2699V4 2.2GHZ 512GB 2 X 500GB SAS H730 pictureDell PowerEdge R610 2x X5670 2.93GHz 6 Core 16GB 6x 146GB 15K SAS PERC 6/i
$775.0
Dell PowerEdge R610 2x X5670 2.93GHz 6 Core 16GB 6x 146GB 15K SAS PERC 6/i picture


Discussions

No Discussions have been posted on this vulnerability.