Note: This is an archival copy of Security Sun Alert 200074 as previously published on http://sunsolve.sun.com.
Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1000058.1.
Article ID : 1000058.1
Article Type : Sun Alerts (SURE)
Last reviewed : 2007-07-15
Audience : PUBLIC
Copyright Notice: Copyright © 2010, Oracle Corporation and/or its affiliates.

Security Vulnerability in Processing GIF Images in the Java Runtime Environment May Allow an Untrusted Applet to Elevate Privileges



Category
Security

Release Phase
Resolved

Product
Java 2 Platform, Standard Edition

Bug Id
6445518

Date of Resolved Release
16-JAN-2007

Impact

A buffer overflow vulnerability in processing GIF images in the Java Runtime Environment may allow an untrusted applet to elevate its privileges. For example, an applet may grant itself permissions to read and write local files or execute local applications with the privileges of the user running the untrusted applet.

Sun acknowledges with thanks, an anonymous researcher working with the Zero Day Initiative (http://www.zerodayinitiative.com/) and TippingPoint (http://www.tippingpoint.com) for bringing this issue to our attention.

More information regarding this issue is available at:


Contributing Factors

This issue can occur in the following releases (for Windows, Solaris, and Linux):

  • JDK and JRE 5.0 Update 9 and earlier
  • SDK and JRE 1.4.2_12 and earlier
  • SDK and JRE 1.3.1_18 and earlier

To determine the default version of the JRE on a system for Solaris and Linux, the following command can be run:

    % java -version

Note: The above command only determines the default version. Other versions may also be installed on the system.

To determine the default version of the JRE on a system for Windows:

  1. Click "Start"
  2. Select "Run"
  3. Type "cmd" (starts a command-line)
  4. At the prompt, type "java -version"

Note: The above command only determines the default version. Other versions may also be installed on the system.


Symptoms

There are no reliable symptoms that would indicate the described issue has been exploited.


Workaround

There is no workaround. Please see the Resolution section below.


Resolution

This issue is addressed in the following releases (for Windows, Solaris, and Linux):

  • JDK and JRE 5.0 Update 10 or later
  • SDK and JRE 1.4.2_13 or later
  • SDK and JRE 1.3.1_19 or later

J2SE 5.0 is available for download at the following links:

J2SE 5.0 Update 10 for Solaris is available in the following patches:

  • J2SE 5.0: update 10 (as delivered in patch 118666-10)
  • J2SE 5.0: update 10 (as delivered in patch 118667-10 (64bit))
  • J2SE 5.0_x86: update 10 (as delivered in patch 118668-10)
  • J2SE 5.0_x86: update 10 (as delivered in patch 118669-10 (64bit))

J2SE 1.4.2 is available for download at:

J2SE 1.3.1 is available for download at:

Note: When installing a new version of the product from a source other than a Solaris patch, it is recommended that the old affected versions be removed from your system. For more information, please see the installation notes on the respective java.sun.com download pages.



Modification History
Date: 18-JAN-2007
  • Updated Impact section


References

118666-10
118667-10
118668-10
118669-10




Attachments
This solution has no attachment