Sun Java JRE / Web Start Java Plug-in Untrusted Applet Privilege Escalation

high Nessus Plugin ID 18480


The remote Windows host contains a runtime environment that is affected by multiple vulnerabilities.


The remote host is using a vulnerable version of Sun Java Runtime Plug-in, an web browser addon used to display Java applets.

It has been reported that the JRE Plug-in Security can be bypassed.
A remote attacker could exploit this by tricking a user into viewing a maliciously crafted web page.

Additionally, a denial of service vulnerability is present in this version of the JVM. This issue is triggered by viewing an applet that misuses the serialization API.


Upgrade to JRE 1.4.2_08 / 1.5.0 update 2 or later.

See Also

Plugin Details

Severity: High

ID: 18480

File Name: java_jre_plugin_security_bypass2.nasl

Version: 1.27

Type: local

Agent: windows

Family: Windows

Published: 6/14/2005

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus Agent

Risk Information


Risk Factor: Medium

Score: 5.5


Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:oracle:jre

Required KB Items: SMB/Java/JRE/Installed

Exploit Ease: No known exploits are available

Patch Publication Date: 6/13/2005

Vulnerability Publication Date: 6/13/2005

Reference Information

CVE: CVE-2005-1973, CVE-2005-1974

BID: 13945, 13958

SECUNIA: 15671