Overview
Multiple vulnerabilities in the Sun Java Reflection API may allow an untrusted Java applet to bypass security restrictions and execute arbitrary code.
Description
The Sun Java Reflection API allows Java classes to determine information about other Java classes, such as public methods. There are seven vulnerabilities in the Java Reflection API that may allow a Java applet to bypass Java applet security restrictions. Once the security restrictions are bypassed, the malicious applet may be able to access and manipulate system resources. For more information on the Java security model see Sun's Java documentation, particularly the Applet Security FAQ. For more information regarding these vulnerabilities and how to correct them, please refer to Sun Alert 102171. Note these issues are different from the one reported in VU#974188. |
Impact
By convincing a user to run a specially crafted Java applet, a remote, unauthenticated attacker may be able to execute arbitrary code with the privileges of the user running the applet. Web browsers with Java support may run applets from untrusted web sites. |
Solution
Upgrade
|
Do not access Java Applets from untrusted sources Java applets are commonly executed within a web browser. Disabling Java within the web browser may prevent an attacker from delivering a malicious applet to a vulnerable system. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
These vulnerabilities were reported in Sun Alert 102171. Sun credits Adam Gowdiak with providing information about these issues.
This document was written by Jeff Gennari.
Other Information
CVE IDs: | CVE-2006-0617 |
Severity Metric: | 4.21 |
Date Public: | 2006-02-07 |
Date First Published: | 2006-02-09 |
Date Last Updated: | 2006-05-03 13:16 UTC |
Document Revision: | 25 |