FreeBSD : jdk/jre -- Applet Caching May Allow Network Access Restrictions to be Circumvented (c93e4d41-75c5-11dc-b903-0016179b2dd5)

This script is Copyright (C) 2007-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

SUN reports :

A vulnerability in the Java Runtime Environment (JRE) with applet
caching may allow an untrusted applet that is downloaded from a
malicious website to make network connections to network services on
machines other than the one that the applet was downloaded from. This
may allow network resources (such as web pages) and vulnerabilities
(that exist on these network services) which are not otherwise
normally accessible to be accessed or exploited.

See also :

http://sunsolve.sun.com/search/document.do?assetkey=1-26-103079-1
http://www.nessus.org/u?99ac0d66

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 4.0
(CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:N)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 26940 (freebsd_pkg_c93e4d4175c511dcb9030016179b2dd5.nasl)

Bugtraq ID:

CVE ID: CVE-2007-5232

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now