CERTA-2007-AVI-348
Vulnerability from certfr_avis

Plusieurs vulnérabilités dans les paquetages java-1.4.2-ibm permettent à un utilisateur malveillant de contourner la politique de sécurité du système vulnérable.

Description

Une première vulnérabilité, liée à Java Web Start, permet à un utilisateur d'élever ses privilèges et d'accéder indûment à des fichiers en lecture et en modification (CVE-2007-2435).

Une seconde vulnérabilité permet à une application (ou à une applet) d'élever ses privilèges et d'exécuter un code arbitraire sur la machine virtuelle (CVE-2007-3004).

Une troisième vulnérabilité permet de bloquer la machine virtuelle, provoquant un déni de service (CVE-2007-3005).

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
IBM N/A Sun Java JDK 1.6.x ;
IBM N/A Sun Java JDK 1.5.x ;
IBM N/A Sun Java JRE 1.3.x ;
IBM N/A Sun Java JRE 1.5.x / 5.x ;
IBM N/A Sun Java SDK 1.3.x ;
IBM N/A Sun Java JRE 1.4.x ;
IBM N/A Sun Java JRE 1.6.x / 6.x ;
IBM N/A Sun Java SDK 1.4.x.
IBM N/A Sun Java Enterprise System 5.x (JSSE) 1.x ;

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Sun Java JDK 1.6.x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Sun Java JDK 1.5.x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Sun Java JRE 1.3.x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Sun Java JRE 1.5.x / 5.x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Sun Java SDK 1.3.x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Sun Java JRE 1.4.x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Sun Java JRE 1.6.x / 6.x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Sun Java SDK 1.4.x.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Sun Java Enterprise System 5.x (JSSE) 1.x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nUne premi\u00e8re vuln\u00e9rabilit\u00e9, li\u00e9e \u00e0 Java Web Start, permet \u00e0 un\nutilisateur d\u0027\u00e9lever ses privil\u00e8ges et d\u0027acc\u00e9der ind\u00fbment \u00e0 des fichiers\nen lecture et en modification (CVE-2007-2435).\n\nUne seconde vuln\u00e9rabilit\u00e9 permet \u00e0 une application (ou \u00e0 une applet)\nd\u0027\u00e9lever ses privil\u00e8ges et d\u0027ex\u00e9cuter un code arbitraire sur la machine\nvirtuelle (CVE-2007-3004).\n\nUne troisi\u00e8me vuln\u00e9rabilit\u00e9 permet de bloquer la machine virtuelle,\nprovoquant un d\u00e9ni de service (CVE-2007-3005).\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2007-2788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-2788"
    },
    {
      "name": "CVE-2007-3004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-3004"
    },
    {
      "name": "CVE-2007-3922",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-3922"
    },
    {
      "name": "CVE-2007-3503",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-3503"
    },
    {
      "name": "CVE-2007-3655",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-3655"
    },
    {
      "name": "CVE-2007-3005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-3005"
    },
    {
      "name": "CVE-2007-2789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-2789"
    },
    {
      "name": "CVE-2007-2435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-2435"
    }
  ],
  "initial_release_date": "2007-08-07T00:00:00",
  "last_revision_date": "2007-11-16T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA-200705-23 du 31 mai 2007 :",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200705-23.xml"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA-200706-08 du 26 juin 2007    :",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200706-08.xml"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 HP OpenView c01269450 du 14 novembre    2007 :",
      "url": "http://www4.itrc.hp.com/service/cki/docDisplay.do?docId=c01269450"
    },
    {
      "title": "Avis du CERTA CERTA-2007-AVI-238 du 01 juin 2007 :",
      "url": "http://www.certa.ssi.gouv.fr/site/CERTA-2007-AVI-238/index.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Avaya ASA-2007-199 du 23 mai 2007 :",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-199.htm"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 SuSE SUSE-SA:2007:045 du 18 juillet    2008 :",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00007.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2007:0829 du 07 ao\u00fbt 2007    :",
      "url": "http://rhn.redhat.com/errata/RHSA-2007-0829.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2007:0818 du 06 ao\u00fbt 2007    :",
      "url": "http://rhn.redhat.com/errata/RHSA-2007-0818.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2007:0817 du 06 ao\u00fbt 2007    :",
      "url": "http://rhn.redhat.com/errata/RHSA-2007-0817.html"
    }
  ],
  "reference": "CERTA-2007-AVI-348",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2007-08-07T00:00:00.000000"
    },
    {
      "description": "modification des syst\u00e8mes affect\u00e9s, ajout des r\u00e9f\u00e9rences CVE et des bulletins de s\u00e9curit\u00e9 des \u00e9diteurs SuSE, Red Hat, Avaya et Gentoo.",
      "revision_date": "2007-08-08T00:00:00.000000"
    },
    {
      "description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 HP OpenView.",
      "revision_date": "2007-11-16T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "Plusieurs vuln\u00e9rabilit\u00e9s dans les paquetages java-1.4.2-ibm permettent \u00e0\nun utilisateur malveillant de contourner la politique de s\u00e9curit\u00e9 du\nsyst\u00e8me vuln\u00e9rable.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans la machine Java d\u0027IBM",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Avis Redhat RHSA-2007:0817-2 du 06 ao\u00fbt 2007",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…