{"vuid":"VU#652636","idnumber":"652636","name":"Sun Java Web Start security bypass vulnerability","keywords":["Sun","Java Web Start","privilege escalation","untrusted application"],"overview":"A vulnerability in the Sun Java Web Start may allow an untrusted Java applet or application to bypass security restrictions and execute arbitrary code.","clean_desc":"Java Web Start technology allows Java applications and applets to be executed via HTTP. Remote applications and applets are specified using the Java Network Launching Protocol (JNLP). The JNLP specification describes the resouces, parameters, and permissions needed to execute the remote application or applet. By default, Java Web Start applications and applets are restricted in what they can access on a host machine. However, an unspecified vulnerability in Java Web Start may allow a Java applet or application to bypass the Java Web Start security restrictions. Once the security restrictions are bypassed, the malicious applet may be able to access and manipulate system resources. For more information regarding this vulnerability, please refer to Sun Alert 102170.","impact":"By convincing a user to run a specially crafted Java applet or application via Java Web Start, a remote, unauthenticated attacker may be able to execute arbitrary code.","resolution":"Upgrade \nThis Java Web Start issue was corrected in Java 2 Platform Standard Edition 5.0 Update 6 and later.","workarounds":"Disable Java Web Start Sun Alert 102170 provides information on how to disable Java Web Start in different web browsers.","sysaffected":"","thanks":"This vulnerability was reported in Sun Alert \n102170\n. Sun credits Peter Csepely with providing information about this issue.","author":"This document was written by Jeff Gennari.","public":["http://sunsolve.sun.com/search/document.do?assetkey=1-26-102170-1","http://secunia.com/advisories/18762/","http://java.sun.com/products/javawebstart/"],"cveids":["CVE-2006-0613"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-02-09T16:18:51Z","publicdate":"2006-02-07T00:00:00Z","datefirstpublished":"2006-02-09T20:23:59Z","dateupdated":"2006-02-19T13:37:18Z","revision":29,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"13","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"15","cam_impact":"18","cam_easeofexploitation":"9","cam_attackeraccessrequired":"15","cam_scorecurrent":"10.935","cam_scorecurrentwidelyknown":"15.7190625","cam_scorecurrentwidelyknownexploited":"29.3878125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":10.935,"vulnote":null}