SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   Java Runtime Environment (JRE) Vendors:   Sun
Java Runtime Environment (JRE) XML External Entity Property Lets Remote Users Access URL Resources
SecurityTracker Alert ID:  1019292
SecurityTracker URL:  http://securitytracker.com/id/1019292
CVE Reference:   CVE-2008-0628   (Links to External Site)
Updated:  Feb 7 2008
Original Entry Date:  Feb 1 2008
Impact:   Denial of service via network, Disclosure of system information, Disclosure of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 6 Update 3 and prior
Description:   A vulnerability was reported in Java Runtime Environment (JRE). A remote user can access URL resources or cause denial of service conditions on the target system.

A remote user can create a specially crafted XML file that, when processed by the target trusted applet, will be able to access URL resources (e.g., files, web pages) or cause denial of service conditions.

This may occur even if the "external general entities" property is set to FALSE.

Chris Evans and Johannes Henkel of the Google Security Team reported this vulnerability.

Impact:   A remote user can access URL resources or cause denial of service conditions on the target system.
Solution:   Sun has issued a fix (JDK and JRE 6 Update 4 or later), available at:

http://java.sun.com/javase/downloads/index.jsp

JDK 6 Update 4 for Solaris is also available in the following patches:

* Java SE 6 update 4 (as delivered in patch 125136-05 or later)
* Java SE 6 update 4 (as delivered in patch 125137-05 or later (64bit))
* Java SE 6 x86 update 4 (as delivered in patch 125138-05 or later)
* Java SE 6 x86 update 4 (as delivered in patch 125139-05 or later (64bit))

The Sun advisory is available at:

http://sunsolve.sun.com/search/document.do?assetkey=1-66-231246-1

Vendor URL:  sunsolve.sun.com/search/document.do?assetkey=1-66-231246-1 (Links to External Site)
Cause:   Access control error, State error
Underlying OS:   Linux (Any), UNIX (Solaris - SunOS), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Apr 16 2008 (BEA Issues Fix for JRockit) Java Runtime Environment (JRE) XML External Entity Property Lets Remote Users Access URL Resources
BEA has issued a fix for JRockit.
Apr 28 2008 (Red Hat Issues Fix) Java Runtime Environment (JRE) XML External Entity Property Lets Remote Users Access URL Resources   (bugzilla@redhat.com)
Red Hat has released a fix for java-1.6.0-bea for Red Hat Enterprise Linux 5.



 Source Message Contents

Date:  Fri, 1 Feb 2008 09:02:54 -0500
Subject:  A Vulnerability in the Java Runtime Environment XML Parsing Code May Allow URL Resources to be Accessed


http://sunsolve.sun.com/search/document.do?assetkey=1-66-231246-1
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC