Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200701-15] Sun JDK/JRE: Multiple vulnerabilities


Vulnerability Assessment Details

[GLSA-200701-15] Sun JDK/JRE: Multiple vulnerabilities

Vulnerability Assessment Summary
Sun JDK/JRE: Multiple vulnerabilities

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200701-15
(Sun JDK/JRE: Multiple vulnerabilities)


Chris Evans has discovered multiple buffer overflows in Sun JDK and Sun
JRE possibly related to various AWT or font layout functions. Tom
Hawtin has discovered an unspecified vulnerability in Sun JDK and Sun
JRE relating to unintended applet data access. He has also discovered
multiple other unspecified vulnerabilities in Sun JDK and Sun JRE
permiting unintended Java applet or application resource acquisition.

Impact

A possible hacker could entice a user to run a specially crafted Java applet
or application that could read, write, or execute local files with the
rights of the user running the JVM
access data maintained in other
Java applets
or escalate the rights of the currently running Java
applet or application permiting for unauthorized access to system
resources.

Workaround

There is no known workaround at this time.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6731
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6736
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6737
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6745


Solution:
All Sun Java Development Kit users should upgrade to the latest
version:
# emerge --sync
# emerge --ask --oneshot --verbose "dev-java/sun-jdk"
All Sun Java Runtime Environment users should upgrade to the latest
version:
# emerge --sync
# emerge --ask --oneshot --verbose "dev-java/sun-jre-bin"


Network Security Threat Level: Medium


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2007 Michel Arboi

Cables, Connectors

Dell PowerEdge R720 Dual Xeon E5-2660 8C 2.2GHz 96GB 8x 600GB SAS iDRAC 2.5in
$1456.0
Dell PowerEdge R720 Dual Xeon E5-2660 8C 2.2GHz 96GB 8x 600GB SAS iDRAC 2.5in pictureDell PowerEdge R720 Dual Xeon E5-2660 8C 2.2GHz 48GB 4x 1.2TB SAS iDRAC 2.5in
$1429.0
Dell PowerEdge R720 Dual Xeon E5-2660 8C 2.2GHz 48GB 4x 1.2TB SAS iDRAC 2.5in pictureDell PowerEdge R720 Dual Xeon E5-2630L 6C 2.0GHz 128GB 8x 480GB SSD iDRAC 2.5in
$3332.0
Dell PowerEdge R720 Dual Xeon E5-2630L 6C 2.0GHz 128GB 8x 480GB SSD iDRAC 2.5in pictureDell PowerEdge R720 Server Dual Xeon E5-2660 8C 2.2GHz 96GB 4x 500GB iDRAC 2.5in
$943.0
Dell PowerEdge R720 Server Dual Xeon E5-2660 8C 2.2GHz 96GB 4x 500GB iDRAC 2.5in picture


Discussions

No Discussions have been posted on this vulnerability.