Sun Java JDK/JRE 6 < Update 7 Multiple Vulnerabilities

This script is Copyright (C) 2008-2017 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has an application that is affected by
multiple vulnerabilities.

Description :

The version of Sun Java Runtime Environment (JRE) 6.0 installed on the
remote host is affected by multiple security issues :

- A vulnerability in the JRE could allow unauthorized
access to certain URL resources or cause a denial of
service condition while processing XML data. In order to
successfully exploit this issue a JAX-WS client/service
included with a trusted application should process the
malicious XML content (238628).

- A vulnerability in the JRE may allow an untrusted applet
to access information from another applet (238687).

- A buffer overflow vulnerability in Java Web Start could
allow an untrusted applet to elevate its privileges to
read, write and execute local applications available to
users running an untrusted application (238905).

- A vulnerability in Java Web Start, could allow an
untrusted application to create or delete arbitrary
files subject to the privileges of the user running the
application (238905).

- A vulnerability in Java Web Start, may disclose the
location of Java Web Start cache (238905).

- An implementation defect in the JRE may allow an applet
designed to run 'only' on JRE 5.0 Update 6 or later may
run on older releases of the JRE. Note this only affects
Windows Vista releases of the JRE (238966).

- Vulnerability in Sun Java Management Extensions (JMX)
could allow a JMX client running on a remote host to
perform unauthorized actions on a host running JMX with
local monitoring enabled (238965).

- A vulnerability in the JRE could allow an untrusted
applet / application to elevate its privileges to read,
write and execute local applications with privileges of
the user running an untrusted applet (238967,238687).

- A vulnerability in the JRE may allow an untrusted applet
to establish connections to services running on the
localhost and potentially exploit vulnerabilities
existing in the underlying JRE (238968).

See also :

http://download.oracle.com/sunalerts/1019338.1.html
http://download.oracle.com/sunalerts/1019344.1.html
http://download.oracle.com/sunalerts/1019367.1.html
http://download.oracle.com/sunalerts/1019373.1.html
http://download.oracle.com/sunalerts/1019374.1.html
http://download.oracle.com/sunalerts/1019375.1.html
http://download.oracle.com/sunalerts/1019376.1.html

Solution :

Update to Sun Java JDK and JRE 6 Update 7 or later and remove, if
necessary, any affected versions.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.4
(CVSS2#E:POC/RL:ND/RC:C)
Public Exploit Available : true

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now