Sun Java Web Start PersistenceService Application Traversal Arbitrary File Overwrite (102957)

high Nessus Plugin ID 25627

Synopsis

The remote Windows host has an application that is affected by a privilege escalation vulnerability.

Description

According to its version number, the Sun Java Runtime Environment (JRE) installed on the remote host reportedly may allow an untrusted application to elevate its privileges by first granting itself permission to overwrite any file that is writable by the user running the application.

Solution

Update to Sun Java 2 JDK and JRE 5.0 Update 12 / SDK and JRE 1.4.2_14 / SDK or later and remove, if necessary, any affected versions.

See Also

https://seclists.org/bugtraq/2007/Jul/12

http://www.nessus.org/u?14d648d6

Plugin Details

Severity: High

ID: 25627

File Name: sun_java_jre_102957.nasl

Version: 1.30

Type: local

Agent: windows

Family: Windows

Published: 6/29/2007

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:oracle:jre

Required KB Items: SMB/Java/JRE/Installed

Exploit Ease: No known exploits are available

Patch Publication Date: 6/28/2007

Vulnerability Publication Date: 6/29/2007

Reference Information

CVE: CVE-2007-3504

BID: 24695

CWE: 22