Sun Java JRE XML Signature Command Injection (102993) (Unix)

This script is Copyright (C) 2013 Tenable Network Security, Inc.


Synopsis :

The remote Unix host has an application that may allow arbitrary
command injection.

Description :

The version of Sun Java Runtime Environment (JRE) installed on the
remote host reportedly does not securely process XSLT stylesheets
containing XSLT Transforms in XML Signatures. If an attacker can pass a
specially crafted XSLT stylesheet to a trusted Java application running
on the remote host, it may be possible to execute arbitrary code subject
to the privileges under which the application operates.

See also :

http://www.nessus.org/u?12fdcd89
http://www.nessus.org/u?9c7b05f6
http://www.securityfocus.com/archive/1/473552/30/0/threaded
http://www.nessus.org/u?c74c71d0

Solution :

Upgrade to Sun Java JDK and JRE 6 Update 2 or later and, if necessary,
remove any affected versions.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.9
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Misc.

Nessus Plugin ID: 64822 ()

Bugtraq ID: 24850

CVE ID: CVE-2007-3716