Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200701-15] Sun JDK/JRE: Multiple vulnerabilities


Vulnerability Assessment Details

[GLSA-200701-15] Sun JDK/JRE: Multiple vulnerabilities

Vulnerability Assessment Summary
Sun JDK/JRE: Multiple vulnerabilities

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200701-15
(Sun JDK/JRE: Multiple vulnerabilities)


Chris Evans has discovered multiple buffer overflows in Sun JDK and Sun
JRE possibly related to various AWT or font layout functions. Tom
Hawtin has discovered an unspecified vulnerability in Sun JDK and Sun
JRE relating to unintended applet data access. He has also discovered
multiple other unspecified vulnerabilities in Sun JDK and Sun JRE
permiting unintended Java applet or application resource acquisition.

Impact

A possible hacker could entice a user to run a specially crafted Java applet
or application that could read, write, or execute local files with the
rights of the user running the JVM
access data maintained in other
Java applets
or escalate the rights of the currently running Java
applet or application permiting for unauthorized access to system
resources.

Workaround

There is no known workaround at this time.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6731
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6736
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6737
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6745


Solution:
All Sun Java Development Kit users should upgrade to the latest
version:
# emerge --sync
# emerge --ask --oneshot --verbose "dev-java/sun-jdk"
All Sun Java Runtime Environment users should upgrade to the latest
version:
# emerge --sync
# emerge --ask --oneshot --verbose "dev-java/sun-jre-bin"


Network Security Threat Level: Medium


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2007 Michel Arboi

Cables, Connectors

Kingston 2GB Intel RAM CL6 Memory 800Mhz For PC2-6400 Desktop memory DIMM * 1pcs
$0.01
Kingston 2GB Intel RAM CL6 Memory 800Mhz For PC2-6400 Desktop memory DIMM * 1pcs pictureLaptop DDR2 Memory SO-DIMM 2GB PC2-6400S 200PIN 2RX8 RAM 800MHZ 1.8V tested 1pcs
$0.01
Laptop DDR2 Memory SO-DIMM 2GB PC2-6400S 200PIN 2RX8 RAM 800MHZ 1.8V tested 1pcs pictureRamaxel 2GB 2Rx8 PC3-10600S DDR3 SO-Dimm Laptop Memory RAM RMT3020EF48E8W-1333
$4.94
Ramaxel 2GB 2Rx8 PC3-10600S DDR3 SO-Dimm Laptop Memory RAM RMT3020EF48E8W-1333 pictureElpida 2GB SO-DIMM DDR3 1333 (PC3 10600) Memory (EBJ21UE8BDS0DJF)
$3.49
Elpida 2GB SO-DIMM DDR3 1333 (PC3 10600) Memory (EBJ21UE8BDS0DJF) picture


Discussions

No Discussions have been posted on this vulnerability.