Security Advisories and Notifications


Subject: Security Advisory (BEA07-177.00)
From: Oracle Corporation
Minor Subject: Multiple Security Vulnerabilities in the Java Runtime Environment
Product(s) Affected: BEA JRockit and BEA Products Using JRockit

Threat level: High
Multiple security vulnerabilities found that might cause applets or applications to elevate their privileges or execute arbitary code.

Severity: High
An attacker could elevate their privileges or execute arbitary code.

Problems were identified that could potentially cause a security vulnerability in certain versions of JRockit. Upgrades are available to correct this problem (see Section II). Oracle treats potential security problems with a high degree of urgency and endeavors to take appropriate steps to help ensure the security of our customers' systems. As a result, Oracle strongly suggests the following actions:

I. Read the following advisory.
II. Apply the suggested action.
III. If you know of any additional users interested in future security advisories, please forward them the registration instructions included in this advisory.

I. Advisory

This is a combined security advisory for Sun Security Alerts #102958, #102934, #103024, #102993 and #102995

Sun Alert #102958

A defect in the Javadoc tool in various releases of the JDK may lead to the generation of HTML documentation pages which contain a potential cross-site scripting (XSS) vulnerability. This may allow a remote user to gain access to cookies from the website that hosts the generated documentation.

. JDK 6
. JDK 5.0 Update 11 and earlier

Sun Microsystems advised of this JRE vulnerability at
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102958-1

Sun Alert #102934

A buffer overflow vulnerability in the image parsing code in the Java Runtime Environment may allow an untrusted applet or application to elevate its privileges. For example, an applet may grant itself permissions to read and write local files or execute local applications that are accessible to the user running the untrusted applet.

. JDK and JRE 6
. JDK and JRE 5.0 Update 10 and earlier
. SDK and JRE 1.4.2_14 and earlier
. SDK and JRE 1.3.1_20 and earlier

A second vulnerability may allow an untrusted applet or application to cause the Java Virtual Machine to hang.

. JDK and JRE 6
. JDK and JRE 5.0 Update 10 and earlier
. SDK and JRE 1.4.2_14 and earlier
. SDK and JRE 1.3.1_19 and earlier

Sun Microsystems advised of this JRE vulnerability at
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102934-1

Sun Alert #103024

A vulnerability in the font parsing code in the Java(TM) Runtime Environment may allow an untrusted applet to elevate its privileges. For example, an applet may grant itself permissions to read and write local files or execute local applications that are accessible to the user running the untrusted applet.

. JDK and JRE 5.0 Update 9 and earlier
. SDK and JRE 1.4.2_14 and earlier

Sun Microsystems advised of this JRE vulnerability at
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103024-1

Sun Security Alert #102993

The Java XML Digital Signature implementation that is included in the JDK and JRE 6 release does not securely process XSLT stylesheets contained in XSLT Transforms in XML Signatures. This could lead to the execution of arbitrary code with the permissions of the application processing XML signatures that include these XSLT stylesheets.

. JDK and JRE 6 Update 1 and earlier

Sun Microsystems advised of this JRE vulnerability at
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102993-1

Sun Security Alert #102995

A security vulnerability in the Java Runtime Environment Applet Class Loader may allow an untrusted applet that is loaded from a remote system to circumvent network access restrictions and establish socket connections to certain services running on the local host, as if it were loaded from the system that the applet is running on. This may allow the untrusted remote applet the ability to exploit any security vulnerabilities existing in the services it has connected to.

. JDK and JRE 6 Update 1 and earlier
. JDK and JRE 5.0 Update 11 and earlier
. SDK and JRE 1.4.2_14 and earlier

Sun Microsystems advised of this JRE vulnerability at
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102995-1

Impact and CVSS Ratings:

The issues described above are rated equally:

CVSS Severity Score: 5.3 (Medium)
Attack Range (AV): Remote
Attack Complexity (AC): High
Authentication Level (Au): Not Required
Impact Type: Unauthorized access. Partial confidentiality and integrity violation
Vulnerability Type: Elevation of Privilege, Execution of Arbitrary Code
CVSS Base Score Vector: (AV:R/AC:H/Au:NR/C:C/I:C/A:N/B:N)

Complete CVSS Guide: http://www.first.org/cvss/cvss-guide.html
Online Calculator: http://nvd.nist.gov/cvss.cfm?calculator

The following versions of BEA JRockit are affected by this vulnerability

BEA JRockit R27.3.1 or prior using

. JDK and JRE 6 Update 1 and earlier
. JDK and JRE 5.0 Update 11 and earlier
. SDK and JRE 1.4.2 Update 14 and earlier

BEA JRockit 7.0 SP6 RP1 or prior using JRE 1.3.1_20 and earlier

II. SUGGESTED ACTION

Oracle strongly recommends the following course of actions.

For JDK 1.4.2 JDK, 1.5.0 or JDK 6:

If you are using JRockit release R27.3.1 or earlier, please contact BEA Technical Support at support@bea.com for the appropriate patch. You can verify your version of BEA JRockit by running "java -version".

For JRE 1.3.1

Sun has currently not released a patch for JRE 1.3.1



SECURITY COMMUNICATIONS

Oracle strongly suggests that customers apply the remedies recommended in all our security advisories. Oracle also urges customers to apply every Service/Maintenance Pack as they are released. Service/Maintenance Packs include a roll-up of all bug fixes for each version of the product, as well as each of the prior Service/Maintenance Packs. Service/Maintenance Packs and information about them can be found at: http://www.oracle.com/technology/software/products/ias/bea_main.html

Note: Information about securing WebLogic Server and WebLogic Express can be found at http://edocs.bea.com/wls/docs103/security.html. Specific lockdown information is provided at http://e-docs.bea.com/wls/docs103/lockdown/index.html. We strongly encourage you to review this documentation to ensure your server deployment is securely configured.

As a policy, if there are any security-related issues with any Oracle product, Oracle will distribute an advisory and instructions with the appropriate course of action. Because the security of your site, data, and code is our highest priority, we are committed to communicating all security-related issues clearly and openly.

All previous advisories can be viewed at: http://www.oracle.com/technology/deploy/security/wls-security.

Additional users who wish to register for product advisory distribution should follow the registration directions at: http://www.oracle.com/technology/deploy/security/alerts.htm.

Security issues can be reported to Oracle by following the directions at: http://www.oracle.com/technology/deploy/security/alerts.htm.

Thank you,
Oracle Corporation