---------------------------------------------------------------------- Secunia is pleased to announce the release of the annual Secunia report for 2008. Highlights from the 2008 report: * Vulnerability Research * Software Inspection Results * Secunia Research Highlights * Secunia Advisory Statistics Request the full 2008 Report here: http://secunia.com/advisories/try_vi/request_2008_report/ Stay Secure, Secunia ---------------------------------------------------------------------- TITLE: Sun Java JDK / JRE Multiple Vulnerabilities SECUNIA ADVISORY ID: SA34451 VERIFY ADVISORY: http://secunia.com/advisories/34451/ DESCRIPTION: Some vulnerabilities have been reported in Sun Java, which can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), or potentially compromise a user's system. 1) An error while initialising LDAP connections can be exploited to render the LDAP service unresponsive. 2) An error in the JRE LDAP client implementation can be exploited to load and execute arbitrary code via specially crafted data received from a malicious LDAP server. 3) An integer overflow vulnerability in JRE when unpacking applets and in Java Web Start applications using the "unpack200" JAR unpacking utility can be exploited to potentially execute arbitrary code. 4) An error in JRE when unpacking applets and in Java Web Start applications using the "unpack200" JAR unpacking utility can be exploited to cause a buffer overflow and potentially execute arbitrary code. 5) Two errors when storing and processing temporary font files can be exploited by an untrusted applet or a Java Web Start application to consume an overly large amount of disk space. 6) An error in the Java Plug-in when deserializing applets can be exploited to e.g. read, write, or execute local files. 7) The Java Plug-in allows JavaScript code loaded from the local system to connect to arbitrary local ports. This can be exploited in combination with cross-site scripting attacks to access normally restricted local ports. 8) The Java Plug-in allows applets to run in earlier versions of JRE if approved by the user. This can be exploited to trick a user into loading a malicious applet into an old and potentially vulnerable JRE version. 9) An error in the Java Plug-in when processing crossdomain.xml files can be exploited by an untrusted applet to connect to arbitrary domains providing a crossdomain.xml file. 10) An error in the Java Plug-in can be exploited by a signed applet to alter the contents of the security dialog and trick a user into trusting the applet. 11) An error in the JRE virtual machine when generating code can be exploited to e.g. read, write, or execute local files. NOTE: This vulnerability only affects JDK and JRE 6 Update 12 and earlier for the Solaris SPARC platform. 12) An error in JRE when processing PNG images can be exploited by an untrusted Java Web Start application to cause a buffer overflow and potentially execute arbitrary code. 13) An error in JRE when processing GIF images can be exploited by an untrusted Java Web Start application to cause a buffer overflow and potentially execute arbitrary code. 14) An error in JRE when processing GIF images can be exploited by an untrusted applet or an untrusted Java Web Start application to cause a buffer overflow and potentially execute arbitrary code. 15) An error in JRE when processing fonts can be exploited by an untrusted applet or an untrusted Java Web Start application to cause a buffer overflow and potentially execute arbitrary code. 16) An unspecified error in the JRE HTTP server implementation can be exploited to render a JAX-WS service endpoint unresponsive. Please see the vendor advisories for details on affected products and versions. SOLUTION: Update to a fixed version. JDK and JRE 6 Update 13: http://java.sun.com/javase/downloads/index.jsp JDK and JRE 5.0 Update 18: http://java.sun.com/javase/downloads/index_jdk5.jsp Java SE for Business SDK and JRE 1.4.2_20: http://www.sun.com/software/javaseforbusiness/getit_download.jsp SDK and JRE 1.3.1_25 (for customers with Solaris 8 and Vintage Support Offering support contracts): http://java.sun.com/j2se/1.3/download.html NOTE: Java SE SDK and JRE 1.4.2 have reached Sun End of Service Life (EOSL). Upgrade to the latest Java SE release or migrate to Java SE for Business. PROVIDED AND/OR DISCOVERED BY: 1, 2, 6, 7, 8, 11, 16) Reported by the vendor. 3, 4) The vendor credits regenrecht working with iDefense and Chris Evans of Google. 5) The vendor credits Marc Schoenefeld. 9) The vendor credits Gregory Fleischer. 10) The vendor credits Michael Scheirl. 12, 13, 14) The vendor credits regenrecht working with iDefenese. 15) The vendor credits Sean Larsson, iDefense. ORIGINAL ADVISORY: Sun: http://sunsolve.sun.com/search/document.do?assetkey=1-66-254569-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-254570-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-254608-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-254611-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-254610-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-254571-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-254609-1 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------