SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   Java Runtime Environment (JRE) Vendors:   Sun
Java Runtime Environment (JRE) XML Digital Signature Flaw May Let Remote Users Bypass Authentication
SecurityTracker Alert ID:  1022661
SecurityTracker URL:  http://securitytracker.com/id/1022661
CVE Reference:   CVE-2009-0217   (Links to External Site)
Date:  Aug 5 2009
Impact:   Host/resource access via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): JDK and JRE 6 Update 14 and prior
Description:   A vulnerability was reported in the Java Runtime Environment (JRE) in the XML digital signature implementation. A remote user can forge digital certificates.

A remote user may be able to exploit a flaw in the verification of HMAC-based XML digital signatures to bypass authentication. Applications that validate HMAC-based XML digital signatures may be affected.

JDK and JRE 5.0 and SDK and JRE 1.4.2 and 1.3.1 are not affected.

Impact:   A remote user may be able to bypass authentication. The specific impact depends on the target application.
Solution:   The vendor has issued a fix for Windows, Solaris, and Linux:

* JDK and JRE 6 Update 15 or later

Java SE releases are available at:

JDK and JRE 6 Update 15:

* http://java.sun.com/javase/downloads/index.jsp

JRE 6 Update 15:

* http://java.com/
* Through the Java Update tool for Microsoft Windows users

JDK 6 Update 15 for Solaris is available in the following patches:

* Java SE 6: update 15 (as delivered in patch 125136-16)
* Java SE 6: update 15 (as delivered in patch 125137-16 (64bit))
* Java SE 6_x86: update 15 (as delivered in patch 125138-16)
* Java SE 6_x86: update 15 (as delivered in patch 125139-16 (64bit))

Java SE for Business releases are available at:

* http://www.sun.com/software/javaseforbusiness/getit_download.jsp

Note: When installing a new version of the product from a source other than a Solaris patch, it is recommended that the old affected versions be removed from your system. To remove old affected versions on the Windows platform, please see:

* http://www.java.com/en/download/help/5000010800.xml

The vendor's advisory is available at:

http://sunsolve.sun.com/search/document.do?assetkey=1-66-263429-1

Vendor URL:  sunsolve.sun.com/search/document.do?assetkey=1-66-263429-1 (Links to External Site)
Cause:   Authentication error
Underlying OS:   Linux (Any), UNIX (Solaris - SunOS), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Sep 3 2009 (Apple Issues Fix) Java Runtime Environment (JRE) XML Digital Signature Flaw May Let Remote Users Bypass Authentication
Apple has issued a fix for Mac OS X 10.5.
Dec 23 2009 (Red Hat Issues Fix) Java Runtime Environment (JRE) XML Digital Signature Flaw May Let Remote Users Bypass Authentication   (bugzilla@redhat.com)
Red Hat has issued a fix for java-1.6.0-ibm for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.



 Source Message Contents

Date:  Tue, 4 Aug 2009 20:38:57 -0400
Subject:  http://sunsolve.sun.com/search/document.do?assetkey=1-66-263429-1


263429

A Security Vulnerability With Verifying HMAC-based XML Digital Signatures in the XML 
Digital Signature Implementation Included With the Java Runtime Environment (JRE) may 
Allow Authentication to be Bypassed

CVE-2009-0217
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC