Sun Java JRE / Web Start Java Plug-in Untrusted Applet Privilege Escalation

This script is Copyright (C) 2005-2013 Tenable Network Security, Inc.


Synopsis :

The remote Windows host contains a runtime environment that is
affected by multiple vulnerabilities.

Description :

The remote host is using a vulnerable version of Sun Java Runtime
Plug-in, an web browser addon used to display Java applets.

It has been reported that the JRE Plug-in Security can be bypassed.
A remote attacker could exploit this by tricking a user into viewing
a maliciously crafted web page.

Additionally, a denial of service vulnerability is present in this
version of the JVM. This issue is triggered by viewing an applet
that misuses the serialization API.

See also :

http://www.nessus.org/u?0103e844

Solution :

Upgrade to JRE 1.4.2_08 / 1.5.0 update 2 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.9
(CVSS2#E:U/RL:OF/RC:ND)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 18480 (java_jre_plugin_security_bypass2.nasl)

Bugtraq ID: 13958
13945

CVE ID: CVE-2005-1973
CVE-2005-1974

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now