CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
EPSS
Percentile
96.3%
There is a vulnerability in the Sun Java Plug-in that could allow a malicious Java applet to bypass restrictions for untrusted applets.
The Java Plug-in is part of the Java 2 Runtime Environment (JRE) and establishes a framework for displaying Java applets within a web browser. There is a vulnerability in the Java Plug-in security framework that could allow a malicious applet to bypass restrictions for accessing private Java packages.
Java’s built-in security framework is designed to prevent access to private Java packages that are used internally by the Java Virtual Machine (JVM). When a Java applet attempts to access one of these packages, an AccessControlException
will be thrown indicating that the requested access is denied. However, a flaw in the security framework fails to prevent such access to these private Java packages via JavaScript code.
By convincing a victim to download and run a malicious Java applet, an intruder could read, write, and modify files on the system with privileges of the victim.
The reporter notes that some private Java packages contain classes that allow direct access to memory or provide methods that can modify private fields of Java objects. This could allow an intruder to disable the Java security manager.
Upgrade
Sun has issued an advisory which addresses this issue. For more information on upgrades available for your system, please refer to Sun Security Alert 57591.
760344
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: November 23, 2004
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Please refer to Sun Security Alert 57591.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23760344 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
This vulnerability was reported by Jouko Pynnonen.
This document was written by Damon Morda.
CVE IDs: | CVE-2004-1029 |
---|---|
Severity Metric: | 17.55 Date Public: |
java.sun.com/docs/books/tutorial/essential/system/securityIntro.html
java.sun.com/docs/books/tutorial/reflect/
java.sun.com/j2se/1.5.0/docs/api/java/security/AccessControlException.html
java.sun.com/j2se/desktopjava/jre/index.jsp
java.sun.com/products/plugin/index.jsp
jouko.iki.fi/adv/javaplugin.html
secunia.com/advisories/13271/
sunsolve.sun.com/search/document.do?assetkey=1-26-57591-1
www.idefense.com/application/poi/display?id=158&type=vulnerabilities&flashstatus=false