Secunia Security Advisory - A weakness and some vulnerabilities have been reported in Sun Java, which can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), or compromise a user's system.
598628d698e2a3b5551e388cdf2533f2f2ed5317403078d2bd4747ad18508c15
----------------------------------------------------------------------
Do you have VARM strategy implemented?
(Vulnerability Assessment Remediation Management)
If not, then implement it through the most reliable vulnerability
intelligence source on the market.
Implement it through Secunia.
For more information visit:
http://secunia.com/advisories/business_solutions/
Alternatively request a call from a Secunia representative today to
discuss how we can help you with our capabilities contact us at:
sales@secunia.com
----------------------------------------------------------------------
TITLE:
Sun Java JDK / JRE Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA37231
VERIFY ADVISORY:
http://secunia.com/advisories/37231/
DESCRIPTION:
A weakness and some vulnerabilities have been reported in Sun Java,
which can be exploited by malicious people to bypass certain security
restrictions, cause a DoS (Denial of Service), or compromise a user's
system.
1) A weakness is caused by the update mechanism failing to update JRE
to a new version when running on non-English Windows versions.
2) An error in the JRE Deployment Toolkit on Windows can be exploited
to execute arbitrary code when viewing a specially crafted web page.
3) An error in the Java Web Start installer can be exploited to run a
malicious Java Web Start application as trusted and executed arbitrary
code.
4) An error in the implementation of the "HsbParser.getSoundBank()"
function can be exploited to cause a stack-based buffer overflow and
potentially execute arbitrary code via an overly long "file://" URL
argument.
5) An unspecified error when processing audio or image files can be
exploited to potentially execute arbitrary code via an untrusted
applet.
6) An error in the implementation of the "setDiffICM()" AWT function
can be exploited to cause a stack-based buffer overflow and
potentially execute arbitrary code.
7) Three unspecified errors when processing audio or image files can
be exploited to potentially execute arbitrary code via an untrusted
applet.
8) An integer overflow error when processing the dimensions of a JPEG
subsample can be exploited to corrupt memory and potentially execute
arbitrary code.
9) An error when verifying HMAC digests can be exploited to
potentially bypass authentication via a fake digital signature that
is incorrectly accepted as valid by a Java application.
10) An error when decoding DER encoded data can be exploited to
exhaust all available JRE memory.
11) An error when parsing HTTP headers can be exploited to exhaust
all available JRE memory.
12) An error in the implementation of the "setBytePixels()" AWT
function can be exploited to cause a heap-based buffer overflow and
potentially execute arbitrary code.
SOLUTION:
Update to a fixed version.
JDK and JRE 6 Update 17:
http://java.sun.com/javase/downloads/index.jsp
JDK and JRE 5.0 Update 22:
http://java.sun.com/javase/downloads/index_jdk5.jsp
Java SE for Business SDK and JRE 1.4.2_24:
http://www.sun.com/software/javaseforbusiness/getit_download.jsp
SDK and JRE 1.3.1_27 (for customers with Solaris 8 and Vintage
Support Offering support contracts):
http://java.sun.com/j2se/1.3/download.html
PROVIDED AND/OR DISCOVERED BY:
3) Peter Csepely, reported via ZDI
4) an anonymous researcher, reported via ZDI
8) regenrecht, reported via ZDI
6, 12) Peter Vreugdenhil, reported via ZDI
The vendor also credits:
1) Tomasz "Tometzky" Ostrowski
2, 5) an anonymous researcher, reported via iDefense
7) regenrecht, reported via iDefense
9) Coda Hale
10, 11) BFK edv-consulting GmbH
CHANGELOG:
2009-11-05: Added additional information provided by ZDI to the
advisory.
ORIGINAL ADVISORY:
Sun:
http://sunsolve.sun.com/search/document.do?assetkey=1-66-269868-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-269869-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-269870-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-270475-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-270476-1
ZDI:
http://www.zerodayinitiative.com/advisories/ZDI-09-076/
http://www.zerodayinitiative.com/advisories/ZDI-09-077/
http://www.zerodayinitiative.com/advisories/ZDI-09-078/
http://www.zerodayinitiative.com/advisories/ZDI-09-079/
http://www.zerodayinitiative.com/advisories/ZDI-09-080/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------