Sun Java JRE / Web Start Java Plug-in Untrusted Applet Privilege Escalation

High Nessus Plugin ID 18480


The remote Windows host contains a runtime environment that is affected by multiple vulnerabilities.


The remote host is using a vulnerable version of Sun Java Runtime Plug-in, an web browser addon used to display Java applets.

It has been reported that the JRE Plug-in Security can be bypassed.
A remote attacker could exploit this by tricking a user into viewing a maliciously crafted web page.

Additionally, a denial of service vulnerability is present in this version of the JVM. This issue is triggered by viewing an applet that misuses the serialization API.


Upgrade to JRE 1.4.2_08 / 1.5.0 update 2 or later.

See Also

Plugin Details

Severity: High

ID: 18480

File Name: java_jre_plugin_security_bypass2.nasl

Version: $Revision: 1.24 $

Type: local

Agent: windows

Family: Windows

Published: 2005/06/14

Modified: 2013/08/19

Dependencies: 33545

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:ND

Vulnerability Information

CPE: cpe:/a:oracle:jre

Required KB Items: SMB/Java/JRE/Installed

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2005/06/13

Vulnerability Publication Date: 2005/06/13

Reference Information

CVE: CVE-2005-1973, CVE-2005-1974

BID: 13958, 13945

OSVDB: 17299, 17340

Secunia: 15671