{"vuid":"VU#336105","idnumber":"336105","name":"Sun Java JRE vulnerable to unauthorized network access","keywords":["Sun","Java","JRE","Applet Caching","privilege escalation","network access"],"overview":"The Sun Java Runtime Environment (JRE) contains a vulnerability that may allow unintended access to network resources.","clean_desc":"The Sun Java Runtime Environment (JRE) allows users to run Java applications in a browser or as standalone programs. Sun has made the JRE available for multiple operating systems. Per Sunsolve Document ID 103079: A vulnerability in the Java Runtime Environment (JRE) with applet caching may allow an untrusted applet that is downloaded from a malicious website to make network connections to network services on machines other than the one that the applet was downloaded from. This may allow network resources (such as web pages) and vulnerabilities (that exist on these network services) which are not otherwise normally accessible to be accessed or exploited. The following java products are affected by this vulnerability: JDK and JRE 6 Update 2 and earlier\nJDK and JRE 5.0 Update 12 and earlier\nSDK and JRE 1.4.2_15 and earlier\nSDK and JRE 1.3.1_20 and earlier","impact":"An attacker may be able to run a Java applet on a vulnerable system to gain access to network connections to resources not otherwise accessible and expose vulnerabilitites within those network resources.","resolution":"Upgrade\nSun has released an upgrade to address this issue. See Sunsolve Document ID 103079 for more details. To adjust the JRE update settings, see the update section of the Java deployment guide.","workarounds":"Disable Java\nDisabling the Java browser plugin may prevent a malicious webpage from exploiting this vulnerability. See the Securing Your Web Browser for instructions on how to disable Java in your browser. Use NoScript\nUsing the Mozilla Firefox NoScript extension to whitelist web sites that can run scripts and access installed plugins will mitigate this vulnerability. See the NoScript FAQ for more information.","sysaffected":"","thanks":"This vulnerability was reported in Sun Alert \n103079\n. Sun credits Billy Rios of \nVeriSign\n with providing information about this issue.","author":"This document was written by Joseph Pruszynski.","public":["http://sunsolve.sun.com/search/document.do?assetkey=1-26-103079-1","http://secunia.com/advisories/27009/","http://conference.hitb.org/hitbsecconf2007kl/?page_id=148","http://noscript.net/faq"],"cveids":["CVE-2007-5232"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-10-05T13:24:22Z","publicdate":"2007-10-04T00:00:00Z","datefirstpublished":"2007-10-05T20:37:22Z","dateupdated":"2007-10-12T19:28:20Z","revision":14,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"12","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"19","cam_impact":"7","cam_easeofexploitation":"11","cam_attackeraccessrequired":"19","cam_scorecurrent":"11.4662625","cam_scorecurrentwidelyknown":"15.6358125","cam_scorecurrentwidelyknownexploited":"26.0596875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":11.4662625,"vulnote":null}