Gentoo Forums
Gentoo Forums
Gentoo Forums
Quick Search: in
[ GLSA 200705-20 ] Blackdown Java: Applet privilege escalation
View unanswered posts
View posts from last 24 hours

 
Reply to topic    Gentoo Forums Forum Index News & Announcements
View previous topic :: View next topic  
Author Message
GLSA
Advocate
Advocate


Joined: 12 May 2004
Posts: 2663

PostPosted: Sat May 26, 2007 9:26 pm    Post subject: [ GLSA 200705-20 ] Blackdown Java: Applet privilege escalati Reply with quote

Gentoo Linux Security Advisory

Title: Blackdown Java: Applet privilege escalation (GLSA 200705-20)
Severity: normal
Exploitable: remote
Date: May 26, 2007
Bug(s): #161835
ID: 200705-20

Synopsis

The Blackdown JDK and the Blackdown JRE suffer from the multiple unspecified vulnerabilities that already affected the Sun JDK and JRE.

Background

Blackdown provides implementations of the Java Development Kit (JDK) and the Java Runtime Environment (JRE).

Affected Packages

Package: dev-java/blackdown-jdk
Vulnerable: < 1.4.2.03-r14
Unaffected: >= 1.4.2.03-r14
Architectures: All supported architectures

Package: dev-java/blackdown-jre
Vulnerable: < 1.4.2.03-r14
Unaffected: >= 1.4.2.03-r14
Architectures: All supported architectures


Description

Chris Evans has discovered multiple buffer overflows in the Sun JDK and the Sun JRE possibly related to various AWT and font layout functions. Tom Hawtin has discovered an unspecified vulnerability in the Sun JDK and the Sun JRE relating to unintended applet data access. He has also discovered multiple other unspecified vulnerabilities in the Sun JDK and the Sun JRE allowing unintended Java applet or application resource acquisition. Additionally, a memory corruption error has been found in the handling of GIF images with zero width field blocks.

Impact

An attacker could entice a user to run a specially crafted Java applet or application that could read, write, or execute local files with the privileges of the user running the JVM, access data maintained in other Java applets, or escalate the privileges of the currently running Java applet or application allowing for unauthorized access to system resources.

Workaround

Disable the "nsplugin" USE flag in order to prevent web applets from being run.

Resolution

Since there is no fixed update from Blackdown and since the flaw only occurs in the applets, the "nsplugin" USE flag has been masked in the portage tree. Emerge the ebuild again in order to fix the vulnerability. Another solution is to switch to another Java implementation such as the Sun implementation (dev-java/sun-jdk and dev-java/sun-jre-bin).
Code:
# emerge --sync
# emerge --ask --oneshot --verbose "dev-java/blackdown-jdk"
# emerge --ask --oneshot --verbose "dev-java/blackdown-jre"


References

CVE-2006-6731
CVE-2006-6736
CVE-2006-6737
CVE-2006-6745
Back to top
View user's profile Send private message
Display posts from previous:   
Reply to topic    Gentoo Forums Forum Index News & Announcements All times are GMT
Page 1 of 1

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum