Sun Java JRE / Web Start Java Plug-in Untrusted Applet Privilege Escalation (Unix)

High Nessus Plugin ID 64836


The remote Unix host contains a runtime environment that is affected by multiple vulnerabilities.


The remote host is using an unmanaged version of Sun Java Runtime Environment that has vulnerabilities in its Java Runtime Plug-in, a web browser add-on used to display Java applets.

The JRE Plug-in security can be bypassed by tricking a user into viewing a maliciously crafted web page.

Additionally, a denial of service vulnerability is present in this version of the JVM. This issue is triggered by viewing an applet that misuses the serialization API.


Upgrade to JRE 1.4.2_08 / 1.5.0 update 2 or later.

See Also

Plugin Details

Severity: High

ID: 64836

File Name: java_jre_plugin_security_bypass2_unix.nasl

Version: $Revision: 1.4 $

Type: local

Family: Misc.

Published: 2013/02/22

Modified: 2013/08/19

Dependencies: 64815

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:ND

Vulnerability Information

CPE: cpe:/a:oracle:jre

Required KB Items: Host/Java/JRE/Installed

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2005/06/13

Vulnerability Publication Date: 2005/06/13

Reference Information

CVE: CVE-2005-1973, CVE-2005-1974

BID: 13958, 13945

OSVDB: 17299, 17340

Secunia: 15671