Overview
The Sun Java Plugin may allow remote users to create files with arbitrary content in a specific location.
Description
From the Sun Java Plugin page: Java Plug-in technology, included as part of the Java 2 Runtime Environment, Standard Edition (JRE), establishes a connection between popular browsers and the Java platform. This connection enables applets on Web sites to be run within a browser on the desktop. |
Impact
This flaw may not constitute a large security risk by itself. However, an attacker gains the ability to create arbitrary file data in a known location that may then be used in another unrelated attack. |
Solution
The CERT/CC is currently unaware of a practical solution to this problem. |
The Sun Java Plugin can be configured to use a nonstandard location for temporary files. This is accomplished in the Java Control Panel, by selecting the "Settings" button in the "Temporary Internet Files" section of the "General" tab. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
Thanks to Andreas Sandblad of Secunia Research for reporting this vulnerability.
This document was written by Ken MacInnis based primarily on information from Secunia.
Other Information
CVE IDs: | None |
Severity Metric: | 5.78 |
Date Public: | 2005-02-08 |
Date First Published: | 2005-02-11 |
Date Last Updated: | 2005-02-11 21:13 UTC |
Document Revision: | 9 |