Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Windows >> Sun JRE Java Plug-in JavaScript Security Restriction Bypass


Vulnerability Assessment Details

Sun JRE Java Plug-in JavaScript Security Restriction Bypass

Vulnerability Assessment Summary
Acertains the version of Java JRE plugin

Detailed Explanation for this Vulnerability Assessment

The remote host is using a vulnerable version of Sun Java Runtime
Plug-in, an addon to many web browser like Internet Explorer to
display java applets.

It has been reported that the Java JRE Plug-in Security can be bypassed.
As a result, a possible hacker may be able to exploit it by creating a malicious
Java applet to compromise the computer.

Additionally, a denial of service vulnerability is present in the remote
version of the JVM. A possible hacker could exploit it by creating an applet
which misuses the serialization API.

Solution: Upgrade to JRE 1.4.2_06 or 1.3.1_13
Network Security Threat Level: High

Networks Security ID: 11726, 11766

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Cisco WS-C2940-8TF-S Catalyst 2940 8-Ports 10/100 1 100BASE-FX 1 1000BASE-X SPF
$35.0
Cisco WS-C2940-8TF-S Catalyst 2940 8-Ports 10/100 1 100BASE-FX  1 1000BASE-X SPF pictureBarcade Foundry SX-ACPWR-POE 1250W POE Power Supply
$140.0
Barcade Foundry SX-ACPWR-POE 1250W POE Power Supply pictureSMC Networks EZ Switch SMC-FS5 EU Ethernet Switch
$14.99
SMC Networks EZ Switch SMC-FS5 EU Ethernet Switch pictureCISCO 3560G WS-C3560G-24TS-S ETHERNET 10/100/1000 SWITCH SHOW VERSION T3-D8
$85.0
CISCO 3560G WS-C3560G-24TS-S ETHERNET 10/100/1000 SWITCH SHOW VERSION T3-D8 picture


Discussions

No Discussions have been posted on this vulnerability.