Sun Java JRE / Web Start Java Plug-in Untrusted Applet Privilege Escalation

high Nessus Plugin ID 18480

Synopsis

The remote Windows host contains a runtime environment that is affected by multiple vulnerabilities.

Description

The remote host is using a vulnerable version of Sun Java Runtime Plug-in, an web browser addon used to display Java applets.

It has been reported that the JRE Plug-in Security can be bypassed.
A remote attacker could exploit this by tricking a user into viewing a maliciously crafted web page.

Additionally, a denial of service vulnerability is present in this version of the JVM. This issue is triggered by viewing an applet that misuses the serialization API.

Solution

Upgrade to JRE 1.4.2_08 / 1.5.0 update 2 or later.

See Also

http://www.nessus.org/u?0103e844

Plugin Details

Severity: High

ID: 18480

File Name: java_jre_plugin_security_bypass2.nasl

Version: 1.27

Type: local

Agent: windows

Family: Windows

Published: 6/14/2005

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:oracle:jre

Required KB Items: SMB/Java/JRE/Installed

Exploit Ease: No known exploits are available

Patch Publication Date: 6/13/2005

Vulnerability Publication Date: 6/13/2005

Reference Information

CVE: CVE-2005-1973, CVE-2005-1974

BID: 13945, 13958

SECUNIA: 15671