Sun Java JRE XML Signature Command Injection (102993) (Unix)

This script is Copyright (C) 2013-2016 Tenable Network Security, Inc.


Synopsis :

The remote Unix host has an application that may allow arbitrary
command injection.

Description :

The version of Sun Java Runtime Environment (JRE) installed on the
remote host reportedly does not securely process XSLT stylesheets
containing XSLT Transforms in XML Signatures. If an attacker can pass a
specially crafted XSLT stylesheet to a trusted Java application running
on the remote host, it may be possible to execute arbitrary code subject
to the privileges under which the application operates.

See also :

http://www.nessus.org/u?12fdcd89
http://www.nessus.org/u?9c7b05f6
http://www.securityfocus.com/archive/1/473552/30/0/threaded
http://www.nessus.org/u?c74c71d0

Solution :

Upgrade to Sun Java JDK and JRE 6 Update 2 or later and, if necessary,
remove any affected versions.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.9
(CVSS2#E:U/RL:OF/RC:C)

Family: Misc.

Nessus Plugin ID: 64822 ()

Bugtraq ID:

CVE ID: CVE-2007-3716

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial