exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Technical Cyber Security Alert 2008-340A

Technical Cyber Security Alert 2008-340A
Posted Dec 5, 2008
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert TA08-340A - Sun has released alerts to address multiple vulnerabilities affecting the Sun Java Runtime Environment. The most severe of these vulnerabilities could allow a remote attacker to execute arbitrary code.

tags | advisory, java, remote, arbitrary, vulnerability
SHA-256 | 50207ce9fa6dd5f34f06451dddf1035eb6c767f28c0d03b8e6d319a1e1aa4261

Technical Cyber Security Alert 2008-340A

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


National Cyber Alert System

Technical Cyber Security Alert TA08-340A


Sun Java Updates for Multiple Vulnerabilities

Original release date: December 05, 2008
Last revised: --
Source: US-CERT


Systems Affected

Sun Java Runtime Environment versions

* JDK and JRE 6 Update 10 and earlier
* JDK and JRE 5.0 Update 16 and earlier
* SDK and JRE 1.4.2_18 and earlier
* SDK and JRE 1.3.1_23 and earlier


Overview

Sun has released alerts to address multiple vulnerabilities
affecting the Sun Java Runtime Environment. The most severe of
these vulnerabilities could allow a remote attacker to execute
arbitrary code.


I. Description

The Sun Java Runtime Environment (JRE) allows users to run Java
applications in a browser or as standalone programs. Sun has
released updates to the Java Runtime Environment software to
address multiple vulnerabilities.

Sun released the following alerts to address these issues:

* 244986 : The Java Runtime Environment Creates Temporary Files
That Have "Guessable" File Names

* 244987 : Java Runtime Environment (JRE) Buffer Overflow
Vulnerabilities in Processing Image Files and Fonts May Allow
Applets or Java Web Start Applications to Elevate Their Privileges

* 244988 : Multiple Security Vulnerabilities in Java Web Start
and Java Plug-in May Allow Privilege Escalation

* 244989 : The Java Runtime Environment (JRE) "Java Update"
Mechanism Does Not Check the Digital Signature of the JRE that it
Downloads

* 244990 : A Buffer Overflow Vulnerability in the Java Runtime
Environment (JRE) May Allow Privileges to be Escalated

* 244991 : A Security Vulnerability in the Java Runtime
Environment (JRE) Related to Deserializing Calendar Objects May
Allow Privileges to be Escalated

* 245246 : The Java Runtime Environment UTF-8 Decoder May Allow
Multiple Representations of UTF-8 Input

* 246266 : Security Vulnerability in Java Runtime Environment May
Allow Applets to List the Contents of the Current User's Home
Directory

* 246286 : Security Vulnerability in the Java Runtime Environment
With Processing RSA Public Keys

* 246346 : A Security Vulnerability in Java Runtime Environment
(JRE) With Authenticating Users Through Kerberos May Lead to a
Denial of Service (DoS)

* 246366 : Security Vulnerabilities in the Java Runtime
Environment (JRE) JAX-WS and JAXB Packages may Allow Privileges to
be Escalated

* 246386 : A Security Vulnerability in Java Runtime Environment
(JRE) With Parsing of Zip Files May Allow Reading of Arbitrary
Memory Locations

* 246387 : A Security Vulnerability in the Java Runtime
Environment may Allow Code Loaded From the Local Filesystem to
Access LocalHost


II. Impact

The impacts of these vulnerabilities vary. The most severe of these
vulnerabilities allows a remote attacker to execute arbitrary code.


III. Solution

Apply an update from Sun

These issues are addressed in the following versions of the Sun
Java Runtime Environment:

* JDK and JRE 6 Update 11
* JDK and JRE 5.0 Update 17
* SDK and JRE 1.4.2_19
* SDK and JRE 1.3.1_24

If you install the latest version of Java, older versions may
remain installed on your computer. If you do not need these older
versions, you can remove them by following Sun's instructions.

Disable Java

Disable Java in your web browser, as described in the Securing Your
Web Browser document. While this does not fix the underlying
vulnerabilities, it does block a common attack vector.


IV. References

* Sun Alert 244986 -
<http://sunsolve.sun.com/search/document.do?assetkey=1-66-244986-1>

* Sun Alert 244987 -
<http://sunsolve.sun.com/search/document.do?assetkey=1-66-244987-1>

* Sun Alert 244988 -
<http://sunsolve.sun.com/search/document.do?assetkey=1-66-244988-1>

* Sun Alert 244989 -
<http://sunsolve.sun.com/search/document.do?assetkey=1-66-244989-1>

* Sun Alert 244990 -
<http://sunsolve.sun.com/search/document.do?assetkey=1-66-244990-1>

* Sun Alert 244991 -
<http://sunsolve.sun.com/search/document.do?assetkey=1-66-244991-1>

* Sun Alert 245246 -
<http://sunsolve.sun.com/search/document.do?assetkey=1-66-245246-1>

* Sun Alert 246266 -
<http://sunsolve.sun.com/search/document.do?assetkey=1-66-246266-1>

* Sun Alert 246286 -
<http://sunsolve.sun.com/search/document.do?assetkey=1-66-246286-1>

* Sun Alert 246346 -
<http://sunsolve.sun.com/search/document.do?assetkey=1-66-246346-1>

* Sun Alert 246366 -
<http://sunsolve.sun.com/search/document.do?assetkey=1-66-246366-1>

* Sun Alert 246386 -
<http://sunsolve.sun.com/search/document.do?assetkey=1-66-246386-1>

* Sun Alert 246387 -
<http://sunsolve.sun.com/search/document.do?assetkey=1-66-246387-1>

* Java SE Technologies at a Glance -
<http://java.sun.com/javase/technologies/>

* Java SE Security -
<http://java.sun.com/javase/technologies/security/index.jsp>

* Can I remove older versions of the JRE after installing a newer
version? -
<http://www.java.com/en/download/faq/5000070400.xml>

* Securing Your Web Browser -
<http://www.us-cert.gov/reading_room/securing_browser/>

____________________________________________________________________

The most recent version of this document can be found at:

<http://www.us-cert.gov/cas/techalerts/TA08-340A.html>
____________________________________________________________________

Feedback can be directed to US-CERT Technical Staff. Please send
email to <cert@cert.org> with "TA08-340A Feedback VU#544435" in
the subject.
____________________________________________________________________

For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
____________________________________________________________________

Produced 2008 by US-CERT, a government organization.

Terms of use:

<http://www.us-cert.gov/legal.html>
____________________________________________________________________

Revision History

December 05, 2008: Initial release


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBSTmWjXIHljM+H4irAQLfMAgAloMlpeNv+WLW09EaIhzZ/VlEXwJnhB09
ResaptUSMPL+gEZF91XqfO+l6e0GEdWn9jhmU5uyxGLdqBfHc292LAOq2Ip2xbfE
IRFDAai//TCRNKI49i9zJhFAhTfuUnWqRtxo56i6vgIvfEtL9Vh/lfQQakI2bZra
jMI7J28pz6RLhVWnYhn45ktRqCod7Nr4JpDCGcTX/GqpDn1IcMwUUqmobaK+Zat8
PTBxVczoMOc9npL5ytXktw6xjVDcnc1BPzMWIzutKUdCMxDc5kNqUr00hPT2LOlb
vWxWKiMl2Ziy26SzCuwblV5ThY7nzbGixG9GFuEQef3OBmDVRzYERw==
=XmO2
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close