Sun Microsystems addresses critical Java flaws

Powered by SC Magazine
 

Sun Microsystems has released product updates to correct several "highly critical" vulnerabilities in its Java programming environment.

The bugs could be exploited to cause a variety of problems, including a denial-of-service attack, the bypassing of certain security restrictions or to compromise a vulnerable system, according to Secunia, a Copenhagen-based leading vulnerability intelligence provider.

The vulnerabilities affect the Java Runtime Environment Virtual Machine, the Java Runtime Environment (JRE), Java Web Start and the Java Plug-in, Secunia said in an advisory on Thursday.

For instance, a pair of flaws in the Java Runtime Environment Virtual Machine can be exploited by a malicious, untrusted applet to read and write files and execute applications locally, according to Secunia. In some circumstances, a bug in JRE can be exploited by untrusted applets or applications to read certain URL resources or potentially execute arbitrary code, thus taking over the computer.

Among the Java Web Start flaws are three boundary errors that can be exploited by an untrusted Java Web Start application to read and write local files and execute local applications. Another bug could be exploited to create files and run applications with the privileges of the user running the untrusted Java Web Start application. Also, a boundary error in Java Web Start could cause a stack-based buffer overflow when a user visits a malicious website.

Other bugs in the Java Runtime Environment could crash the application or allow JavaScript code within a browser to make connections through Java APIs to network services on the local system, Secunia said.

Sun recommends users should upgrade to the following versions: JDK and JRE 6 Update 5; JDK and JRE 5.0 Update 15, and the SDK and JRE 1.4.2_17.

Sun Microsystems did not respond to request for comment.

See original article on scmagazineus.com

Copyright © SC Magazine, US edition


Sun Microsystems addresses critical Java flaws
 
 
 
Top Stories
Photos: Global Switch opens Sydney East data centre
First stage opened, to some fanfare.
 
ATO releases long-awaited Bitcoin guidance
Everyday investors escape the tax man.
 
Why the Weather Bureau’s new supercomputer is a 'gamechanger'
IT transformation starts to reap results.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 482

Vote