Note: This is an archival copy of Security Sun Alert 238628 as previously published on http://sunsolve.sun.com.|
Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1019338.1.
Date of Resolved Release
Security Vulnerabilities in the Java Runtime Environment related to the processing of XML Data
A vulnerability in the Java Runtime Environment related to the processing of XML data may allow unauthorized access to certain URL resources (such as some files and web pages) or a Denial of Service (DoS) condition to be created on the system running the JRE.
For this vulnerability to be exploited, the JAX-WS client or service in a trusted application needs to process XML data that contains malicious content. This vulnerability cannot be exploited through an untrusted applet or untrusted Java Web Start application.
A second vulnerability in the Java Runtime Environment with processing XML data may allow an untrusted applet or application that is downloaded from a website unauthorized access to certain URL resources (such as some files and web pages).
2. Contributing Factors
The first issue can occur in the following releases for Windows, Solaris, and Linux:
The second issue can occur in the following releases for Windows, Solaris, and Linux:
To determine the default version of the JRE that Internet Explorer uses:
The browser will display a page called "Installed plug-ins" which lists the version of the Java Plug-in, as in the following example:
Java(TM) Plug-in 1.5.0_11-b03
The above example indicates the version of the JRE that the browser uses is 1.5.0_11.
There are no predictable symptoms that would indicate that the above issues have been exploited.
There is no workaround for this issue. Please see the Resolution section below.
The first issue is addressed in the following releases for Windows, Solaris, and Linux:
JRE 6 Updates are available through the Java Update tool for Microsoft Windows users.
JDK 6 Update 7 for Solaris is available in the following patches:
JDK 5.0 Update 16 for Solaris is available in the following patches:
For more information
on Security Sun Alerts, see 1009886.1.
This Sun Alert
notification is being provided to you on
an "AS IS"
basis. This Sun Alert notification may contain information provided by
third parties. The issues described in this Sun Alert notification may
or may not impact your system(s). Sun makes no representations,
warranties, or guarantees as to the information contained herein. ANY
AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR
NON-INFRINGEMENT, ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU
ACKNOWLEDGE THAT SUN SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT
OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. This
Sun Alert notification contains Sun proprietary and confidential
information. It is being provided to you pursuant to the provisions of
your agreement to purchase services from Sun, or, if you do not have
notification may only be used for the purposes contemplated by these
Sun Java Standard Edition (Java SE)
This solution has no attachment