VID |
28228 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
A version of Sun Java JDK / JRE which is older than 1.6.0_7 has been installed on the host. The Sun Java JRE installed on the relevant host, according to its version number, has a privilege escalation vulnerability in its font parsing code. Sun Microsystems Java Runtime Environment (JRE) versions prior to 1.6.0_7 are vulnerable to multiple vulnerabilities in the Java Runtime Environment (JRE) and Web Start. By persuading a target user to load a specially-crafted applet, a remote attacker could exploit these vulnerabilities to move / copy local files, read or write local files, and execute arbitrary code on the affected system.
* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://sunsolve.sun.com/search/document.do?assetkey=1-66-238628-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-238687-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-238905-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-238965-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-238966-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-238967-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-238968-1
* Platforms Affected: Sun Microsystems, Sun Java JDK and JRE 6 Update 6 and earlier Sun Microsystems, Solaris 7, 8, 9 Microsoft Windows Any version Unix Any version Linux Any version |
Recommendation |
Upgrade to the latest version of Sun Java 2 SDK/JRE (6 Update 7 or later), available from the Sun Microsystems, Inc. Web site at http://java.sun.com/javase/downloads/index.jsp
-- AND --
When upgrading a Java installation on a computer, all previous versions should be uninstalled to prevent them being accessed to run a malicious applet that may exploit latent vulnerabilities that may exist in those other previous versions.
It is also possible to workaround this issue by disabling Java support in the Web browser or any other applications that provide an environment for execution Java applets. |
Related URL |
CVE-2008-3103~3114 (CVE) |
Related URL |
30140,30141,30142,30143,30144,30146,30148 (SecurityFocus) |
Related URL |
(ISS) |
|