{"vuid":"VU#355284","idnumber":"355284","name":"Sun Java Runtime Environment applet privilege escalation vulnerability","keywords":["Sun","Java Runtime Environment","JRE","privilege escalation","untrusted applet"],"overview":"The Sun Java Runtime Environment (JRE) may allow an untrusted Java applet to bypass Java security settings and execute arbitrary code.","clean_desc":"The Sun Java Runtime Environment provides the libraries and components necessary to run Java-based applications. There is an unspecified vulnerability in the Java Runtime Environment that may allow an untrusted Java applet to bypass the Java security settings. Once the security restrictions are bypassed, the applet may be able to access and manipulate system resources. For more information on the Java security model see Sun's Java documentation, particularly the Applet Security FAQ. For more information regarding this vulnerability, please refer to Sun Alert 102050.","impact":"A remote attacker may be able to execute arbitrary code on a vulnerable system.","resolution":"Upgrade Java \nSun has addressed this issue in the Java Development Kit and Java Runtime Environment 5.0 Update 4 and later.","workarounds":"Do not access Java Applets from untrusted sources Attackers must deliver a malicious Java applet to a vulnerable system in order to take advantage of this vulnerability. By only accessing Java applets from known and trusted sources the chances of exploitation are reduced. Disable Java in web browser\nJava applets are commonly executed within a web browser. Disabling Java within the web browser may prevent an attacker from delivering a malicious applet to a vulnerable system.","sysaffected":"","thanks":"This vulnerability was reported by \nSun Microsystems\n. Sun credits Adam Gowdiak with providing information regarding this issue.","author":"This document was written by Jeff Gennari.","public":["http://sunsolve.sun.com/search/document.do?assetkey=1-26-102050-1","http://secunia.com/advisories/17748/"],"cveids":["CVE-2005-3907"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-11-29T14:51:37Z","publicdate":"2005-11-28T00:00:00Z","datefirstpublished":"2005-12-02T13:53:08Z","dateupdated":"2006-01-12T16:02:15Z","revision":47,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"10","cam_impact":"15","cam_easeofexploitation":"8","cam_attackeraccessrequired":"16","cam_scorecurrent":"9","cam_scorecurrentwidelyknown":"10.8","cam_scorecurrentwidelyknownexploited":"18","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":9.0,"vulnote":null}