SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Oracle Java SE Vendors:   Sun
(Apple Issues Fix) Sun Java Runtime Environment Deployment Toolkit Plugin Launch Method Flaw Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1023266
SecurityTracker URL:  http://securitytracker.com/id/1023266
CVE Reference:   CVE-2009-3865   (Links to External Site)
Date:  Dec 3 2009
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 6 Update 16 and prior
Description:   A vulnerability was reported in the Sun Java Runtime Environment Deployment Toolkit. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create specially crafted HTML that, when loaded by the target user, will exploit a flaw in the launch method to execute arbitrary code on the target system. The code will run with the privileges of the target user.

An anonymous reported this vulnerability via iDefense.

Impact:   A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.
Solution:   Apple has issued a fix (Java for Mac OS X 10.6 Update 1), available from the Software Update pane in System Preferences, or Apple's Software Downloads web site at:

http://www.apple.com/support/downloads/

The download file is named: JavaForMacOSX10.6Update1.dmg
Its SHA-1 digest is: e31791c61b56c7db104baffb00971fad88feb8e4

The Apple advisory will be available at:

http://support.apple.com/kb/HT1222

Vendor URL:  sunsolve.sun.com/search/document.do?assetkey=1-66-269869-1 (Links to External Site)
Cause:   Not specified
Underlying OS:  UNIX (macOS/OS X)
Underlying OS Comments:  10.6

Message History:   This archive entry is a follow-up to the message listed below.
Nov 27 2009 Sun Java Runtime Environment Deployment Toolkit Plugin Launch Method Flaw Lets Remote Users Execute Arbitrary Code



 Source Message Contents

Subject:  APPLE-SA-2009-12-03-1 Java for Mac OS X 10.6 Update 1

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

APPLE-SA-2009-12-03-1 Java for Mac OS X 10.6 Update 1

Java for Mac OS X 10.6 Update 1 is now available and addresses the
following:

Java
CVE-ID:  CVE-2009-3869, CVE-2009-3871, CVE-2009-3875, CVE-2009-3874,
CVE-2009-3728, CVE-2009-3872, CVE-2009-3868, CVE-2009-3867,
CVE-2009-3884, CVE-2009-3873, CVE-2009-3877, CVE-2009-3865,
CVE-2009-3866
Available for:  Mac OS X v10.6.2 and later, Mac OS X Server v10.6.2
and later
Impact:  Multiple vulnerabilities in Java 1.6.0_15
Description:  Multiple vulnerabilities exist in Java 1.6.0_15, the
most serious of which may allow an untrusted Java applet to obtain
elevated privileges. Visiting a web page containing a maliciously
crafted untrusted Java applet may lead to arbitrary code execution
with the privileges of the current user. These issues are addressed
by updating to Java version 1.6.0_17. Further information is
available via the Sun Java website at
http://java.sun.com/javase/6/webnotes/ReleaseNotes.html Credit to
Kevin Finisterre of Netragard for reporting CVE-2009-3867 to Apple.

Java
CVE-ID:  CVE-2009-2843
Available for:  Mac OS X v10.6.2 and later, Mac OS X Server v10.6.2
and later
Impact:  An expired certificate for a Java applet is treated as valid
Description:  An expired certificate for a Java applet is treated as
valid. This issue is addressed through improved handling of expired
certificates. Credit to Simon Heimlicher of ETH Zurich for reporting
this issue.


Java for Mac OS X 10.6 Update 1 may be obtained from the Software
Update pane in System Preferences, or Apple's Software Downloads
web site: http://www.apple.com/support/downloads/

The download file is named: JavaForMacOSX10.6Update1.dmg
Its SHA-1 digest is: e31791c61b56c7db104baffb00971fad88feb8e4

Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (Darwin)

iQEcBAEBAgAGBQJLGCXhAAoJEHkodeiKZIkBfYYH+wWCoTSr8nBo5yp24JjNg20/
+PmLKPblICrGixTtwvVym06gwUw9ZzfNx0Q1/7AsbLo5xj7IkEGFKppMdvQKERP5
ILF1+QFthrLJ0QiJSkLWoOCAr02qyY/2iosl09gnWtODX+pDxYHhcWrVwvGAbYh1
sYgxqq6xWoLxtD1elB30DSpeCVAOMBfQbs1nhyIhVZlILnw8OTWK4QVqbBWwS6ae
oP35rXm4xkBTrnQxrTkIWCFEpX2i92dcR17QA9HF4mnanxBTQSzW6AR3Y8RBIEG8
vU5/tMX+Q/eBkO3q3Ds0phmQ7Qo9dVO6tL8rzWIUPBEkF1KDpZqh1CrCMXEJIMM=
=0Mni
-----END PGP SIGNATURE-----
 _______________________________________________
Do not post admin requests to the list. They will be ignored.
Security-announce mailing list      (Security-announce@lists.apple.com)
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, SecurityGlobal.net LLC