[ advisories | exploits | discussions | news | conventions | security tools | texts & papers ]
 main menu
- feedback
- advertising
- privacy
- FightAIDS
- newsletter
- news
 
 discussions
- read forum
- new topic
- search
 

 meetings
- meetings list
- recent additions
- add your info
 
 top 100 sites
- visit top sites
- sign up now
- members
 
 webmasters

- add your url
- add domain
- search box
- link to us

 
 projects
- our projects
- free email
 
 m4d network
- security software
- secureroot
- m4d.com
Home : Advisories : Sun Security Bulletin #00201

Title: Sun Security Bulletin #00201
Released by: Sun
Date: 21st February 2001
Printable version: Click here
-----BEGIN PGP SIGNED MESSAGE-----



________________________________________________________________________________

     Sun Microsystems, Inc. Security Bulletin

  

Bulletin Number: #00201

Date: February 21, 2001

Cross-Ref: 

Title: Java Runtime Environment unauthorized command execution 

________________________________________________________________________________



The information contained in this Security Bulletin is provided "AS IS."

Sun makes no warranties of any kind whatsoever with respect to the information

contained in this Security Bulletin. ALL EXPRESS OR IMPLIED CONDITIONS,

REPRESENTATIONS AND WARRANTIES, INCLUDING ANY WARRANTY OF NON-INFRINGEMENT OR

IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, ARE

HEREBY DISCLAIMED AND EXCLUDED TO THE EXTENT ALLOWED BY APPLICABLE LAW.



IN NO EVENT WILL SUN MICROSYSTEMS, INC. BE LIABLE FOR ANY LOST REVENUE,

PROFIT OR DATA, OR FOR DIRECT, SPECIAL, INDIRECT, CONSEQUENTIAL, INCIDENTAL

OR PUNITIVE DAMAGES HOWEVER CAUSED AND REGARDLESS OF ANY THEORY OF LIABILITY

ARISING OUT OF THE USE OF OR INABILITY TO USE THE INFORMATION CONTAINED IN

THIS SECURITY BULLETIN, EVEN IF SUN MICROSYSTEMS, INC. HAS BEEN ADVISED OF

THE POSSIBILITY OF SUCH DAMAGES.



If any of the above provisions are held to be in violation of applicable law,

void, or unenforceable in any jurisdiction, then such provisions are waived

to the extent necessary for this disclaimer to be otherwise enforceable in

such jurisdiction.

________________________________________________________________________________



1. Background



   A vulnerability in certain versions of the Java(TM) Runtime Environment

   may allow malicious Java code to execute unauthorized commands. However,

   permission to execute at least one command must have been granted in order

   for this vulnerability to be exploited. Since no permission is granted

   by default, the circumstances necessary to exploit this vulnerability

   are relatively rare. In the Java Development Kit 1.1.x (JDK(TM) 1.1.x)

   (browsers included), an applet must be signed to have execute permission

   (signed applets may execute anything in JDK 1.1.x.)



   This issue may or may not affect other vendors' Java technology

   implementations which are derived from Sun's JDK source base.

   Sun has notified and made the remedy available to its Java licensees.



   To the best of Sun's knowledge, Netscape Navigator(TM) and Microsoft

   Internet Explorer are not exposed to this vulnerability.



   Sun recommends that you upgrade to the latest JDK and JRE releases

   listed in section 3 of this bulletin.





2. Affected Releases



   The following releases are affected:



     Windows Production and Solaris(TM) Reference Releases



     SDK and JRE 1.2.2_005 or earlier

     SDK and JRE 1.2.1_003 or earlier

     JDK and JRE 1.1.8_003 or earlier

     JDK and JRE 1.1.7B_005 or earlier

     JDK and JRE 1.1.6_007 or earlier



     Solaris Production Releases



     SDK and JRE 1.2.2_05a or earlier

     SDK and JRE 1.2.1

     JDK and JRE 1.1.8_10 or earlier

     JDK and JRE 1.1.7B

     JDK and JRE 1.1.6



     Linux Production Release



     SDK and JRE 1.2.2_005 or earlier



   Solaris Production releases SDK and JRE 1.2.1, and JDK and JRE 1.1.7B

   and 1.1.6 should no longer be used. In addition, releases prior to

   JDK and JRE 1.1.6 for Windows or Solaris should no longer be used.

   Users of these releases should upgrade to a later release listed in

   Section 3.



   This vulnerability was fixed in Java 2 Platform, Standard Edition, v 1.3.





3. Binary Update Releases



   The following update releases are available in relation to this issue.



   Windows Production and Solaris Reference Releases



   SDK and JRE 1.2.2_007 http://java.sun.com/products/jdk/1.2/

   SDK and JRE 1.2.1_004 http://java.sun.com/products/jdk/1.2.1/

   JDK and JRE 1.1.8_006 http://java.sun.com/products/jdk/1.1/

   JDK and JRE 1.1.7B_007 http://java.sun.com/products/jdk/1.1.7B/

   JDK and JRE 1.1.6_009 http://java.sun.com/products/jdk/1.1.6/



   Solaris Production Releases



   SDK and JRE 1.2.2_07 http://www.sun.com/software/solaris/java/download.html

   JDK and JRE 1.1.8_12 http://www.sun.com/software/solaris/java/archive.html



   Linux Production Release



   SDK and JRE 1.2.2_007 http://java.sun.com/products/jdk/1.2/download-linux.html



_______________________________________________________________________________

Sun acknowledges, with thanks, Pascal Brisset for bringing this issue to

our attention.

_______________________________________________________________________________

APPENDICES



A.  Sun security bulletins are available at:



    http://sunsolve.sun.com/security



B.  Sun Security Coordination Team's PGP key is available at:



    http://sunsolve.sun.com/pgpkey.txt

        

C.  To report or inquire about a security problem with Sun(TM) software,

    contact one or more of the following:



        - Your local Sun answer centers

        - Your representative computer security response team, such as CERT

        - Sun Security Coordination Team. Send email to:



     security-alert@sun.com



D.  To receive information or subscribe to our CWS (Customer Warning System)

    mailing list, send email to:



    security-alert@sun.com



    with a subject line (not body) containing one of the following commands:



        Command         Information Returned/Action Taken

        _______         _________________________________



        help            An explanation of how to get information



        key             Sun Security Coordination Team's PGP key



        list            A list of current security topics



        query [topic]   The email is treated as an inquiry and is forwarded to

                        the Security Coordination Team



        report [topic]  The email is treated as a security report and is

                        forwarded to the Security Coordination Team. Please

                        encrypt sensitive mail using Sun Security Coordination

                        Team's PGP key



        send topic      A short status summary or bulletin. For example, to

                        retrieve a Security Bulletin #00138, supply the

                        following in the subject line (not body):

        

                                send #138



        subscribe       Sender is added to our mailing list.  To subscribe,

                        supply the following in the subject line (not body):



                            subscribe cws your-email-address



                        Note that your-email-address should be substituted

                        by your email address.



        unsubscribe     Sender is removed from the CWS mailing list.

________________________________________________________________________________



Copyright 2001 Sun Microsystems, Inc. All rights reserved. Sun,

Sun Microsystems, the Sun logo, Solaris, Java, and JDK are trademarks or

registered trademarks of Sun Microsystems, Inc. in the United States and

other countries. Netscape Navigator is a trademark or registered trademark of

Netscape Communications Corporation in the United States and other countries.

This Security Bulletin may be reproduced and distributed, provided that this

Security Bulletin is not modified in any way and is attributed to

Sun Microsystems, Inc. and provided that such reproduction and distribution

is performed for non-commercial purposes.



-----BEGIN PGP SIGNATURE-----

Version: 2.6.2



iQCVAwUBOpPwWLdzzzOFBFjJAQFENgP+PuLcmM4o1cRNxx15rWoi+KdhMRpErQeD

T1r+CPwEAyZb1weHwyZEFnN702rq9L6XH4UUPX1z9lb8Yl+hTpaUVth+5hyYbCd5

BC+2Mr9AuXysG07lp8Kx6k14NYqDJWa9sAyLGqcaoA8phWcfJO7ZMH65cVc+LZ2E

5E8UEsyFihI=

=nKYv

-----END PGP SIGNATURE-----










(C) 1999-2000 All rights reserved.