search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Sun Java Management Extensions privilege escalation vulnerability

Vulnerability Note VU#931684

Original Release Date: 2005-12-02 | Last Revised: 2006-01-12

Overview

A vulnerability in the Sun Java Management Extensions API may allow a remote attacker to execute arbitrary code.

Description

According to Sun Microsystems:

Java Management Extensions (JMX) technology provides the tools for building distributed, Web-based, modular and dynamic solutions for managing and monitoring devices, applications, and service-driven networks.

An unspecified vulnerability in the JMX API may allow an untrusted Java applet to execute elevated privileges. For more information, please refer to Sun Alert 102017.

Impact

A remote attacker may be able to execute arbitrary code.

Solution

Upgrade Java
Sun addressed this issue in the Java Development Kit (JDK) and the Java Runtime Environment (JRE) 5.0 Update 4.

Do not access Java Applets from untrusted sources


Attackers must deliver a malicious Java applet to a vulnerable system in order to take advantage of this vulnerability. By only accessing Java applets from known and trusted sources the chances of exploitation are reduced.

Disable Java in web browser

Java applets are commonly executed within a web browser. Disabling Java within the web browser may prevent an attacker from delivering a malicious applet to a vulnerable system.

Vendor Information

931684
 

Sun Microsystems, Inc. Affected

Notified:  November 29, 2005 Updated: November 30, 2005

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see http://sunsolve.sun.com/search/document.do?assetkey=1-26-102017-1.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A

References

Acknowledgements

This vulnerability was reported by Sun Microsystems. Sun credits Adam Gowdiak with providing information regarding this issue.

This document was written by Jeff Gennari.

Other Information

CVE IDs: CVE-2005-3904
Severity Metric: 9.00
Date Public: 2005-11-28
Date First Published: 2005-12-02
Date Last Updated: 2006-01-12 16:02 UTC
Document Revision: 33

Sponsored by CISA.