[ advisories | exploits | discussions | news | conventions | security tools | texts & papers ]
 main menu
- feedback
- advertising
- privacy
- FightAIDS
- newsletter
- news
- read forum
- new topic
- search

- meetings list
- recent additions
- add your info
 top 100 sites
- visit top sites
- sign up now
- members

- add your url
- add domain
- search box
- link to us

- our projects
- free email
 m4d network
- security software
- secureroot
- m4d.com
Home : Advisories : Vulnerability in Java Runtime Environment

Title: Vulnerability in Java Runtime Environment
Released by: Hewlett-Packard
Date: 29th November 2000
Printable version: Click here
                        HP Support Information Digests


o  IT Resource Center World Wide Web Service


   If you subscribed through the IT Resource Center and would

   like to be REMOVED from this mailing list, access the

   IT Resource Center on the World Wide Web at:


   Login using your IT Resource Center User ID and Password.

   Then select Support Information Digests (located under

   Maintenance and Support).  You may then unsubscribe from the

   appropriate digest.


Digest Name:  daily security bulletins digest

    Created:  Thu Nov 30 12:51:03 PST 2000

Table of Contents:

Document ID      Title

---------------  -----------

HPSBUX0011-132   Sec. Vulnerability in JRE

The documents are listed below.


Document ID:  HPSBUX0011-132

Date Loaded:  20001129

      Title:  Sec. Vulnerability in JRE




    The information in the following Security Bulletin should be

    acted upon as soon as possible.  Hewlett-Packard Company will

    not be liable for any consequences to any customer resulting

    from customer's failure to fully implement instructions in

    this Security Bulletin as soon as possible.


ISSUE:   Sun Microsystems discovered a potential security issue

         in the Java Runtime Environment.  The issue poses a

         possible security risk by allowing an untrusted class

         to call into a disallowed class under certain


PLATFORM:  HP9000 Series 700/800 running HP-UX releases 10.20 and

           11.00 only.  This security bulletin applies to Java

           on HP-UX.  It does not cover software shipped on Linux

           nor on Windows/NT.

POSSIBLE RESULT: Improper access rights may be granted in some cases.

SOLUTION:  Install the latest Java releases as described below,

           and/or check your system for Java Plug-ins as outlined


AVAILABILITY: The fixed releases are available immediately.



  A. Background

     Java  1.1 and 1.2 applications may permit unauthorized access

     in some cases.

  B. Fixing the problem

     Obtain and install the latest releases of the Java products.

     For JDK/JRE 1.1 and JDK/JRE 1.2.2 based releases go to


     Section C. 1.) below will guide you in determining your

       installed Java version on HP-UX.

     Section C. 2.) below guides you in checking your system

       for Java Plug-ins for Windows (OBAM product).

  C. Recommended solution

         JDK and JRE or higher for HP-UX 10.20 and 11.x.

         JDK and JRE* or higher for HP-UX 11.x

         JDK and JRE 1.3 (when available) for HP-UX 11.x.

    * NOTE:  Version is the minimum to resolve the issue

             addressed in this security bulletin.

             However, JDK and JRE version or later are

             preferred since they incorporate product quality



 1.) HP-UX: Determining Java version information for JDK, JRE, and JPI


There are two mechanisms to determine which versions of the Java

JDK/SDK (developer kit), JRE (runtime), or JPI (Java Plugin for

Netscape) you have installed. First, you can use the following

command to list the bundle revisions for any installed Java


      /usr/sbin/swlist -l bundle | grep -i java

Second, you can ask Java to identify itself by executing the


      /bin/java -version

where path is typically

      /opt/java - for Java 1.1

      /opt/java1.2 - for Java 1.2

      /opt/java1.3 - for Java 1.3

or is any alternate location where the JDK or JRE may have been


The plugin (JPI) is installed in user's home directories, so

you will need to check its version using the following.

For Java 1.2:

      $HOME/.netscape/java/bin/java -version

For Java 1.1, you must use:

      what $HOME/.netscape/java/bin/PA_RISC/green_threads/jre

Note: Do not rely on Netscape's Help/About_Plug-ins menu to find the

version number of the Plugin, because in some cases the version

number is incorrect.

    a.) Unplugging the Plugin (Since the Plugin is manually

        installed into Netscape, it must be manually removed as well.)

    If you have a plugin that you wish to remove because it has a

    security issue, in addition to doing a swremove of the product

    you must also do the following for Java 1.1 and Java 1.2:

    rm -f $HOME/.netscape/plugins/javaplugin.sl

    rm -rf $HOME/.netscape/java


 2.) Determining Java Runtime Environment (JRE) version information

     for HP-UX 10.20 and 11.00, and Java Plug-in for Microsoft

     Windows which is shipped as part of the ServiceControl Manager

     product (HP-UX 10.20 and 11.00)


The Java Runtime Environment for HP-UX and the Java Plug-in for

Microsoft Windows are delivered as part of the ServiceControl Manager

product.  The versions of Java Runtime Environment and Java Plug-in

which shipped with the ServiceControl Manager product in Application

Release 49 (6/00) and Application Release 50 (9/00) are subject to

this vulnerability; the versions of ServiceControl Manager beginning with

Application release 51 (12/00) and HP-UX release 11.i have repaired

versions of the Java Runtime Environment and Java Plug-in and are NOT

subject to this vulnerability.


To determine if your HP-UX 10.20 or 11.00 system is vulnerable,

perform the following command on the HP-UX system:

        swlist -l product OBAM ServControlMgr

If the swlist output contains any of the lines listed below, your

HP-UX system is subject to this vulnerability.  If the swlist output

does not contain any of the lines below, skip to PART TWO to determine

if you have a related vulnerability.

  OBAM                  B. Object Action Manager user

                          interface framework for HP-UX tools

  OBAM                  B. Object Action Manager user

                          interface framework for HP-UX tools

  ServControlMgr        A.01.00     HP-UX ServiceControl Manager

  ServControlMgr        A.01.01     HP-UX ServiceControl Manager

  ServControlMgr        A.01.01.01  HP-UX ServiceControl Manager

If your HP-UX system is subject to this vulnerability, retrieve the

most recent version (A.02.02 or later) of ServiceControl Manager

bundle B8337BA from the HP web site:


Follow the link to ServiceControl Manager B8337BA bundle, then follow

the instructions to install version A.02.02 or later of that bundle.


If you have installed the Java Plug-in for Microsoft Windows on a PC

according to the instructions provided with ServiceControl Manager,

that PC may be vulnerable.  To determine if a PC is subject to this

vulnerability, open a DOS window and execute the command "jre -help".

Among other things, the Java version is displayed.  If the version

string displayed is "1.1.8" , the PC is subject to this vulnerability.

If the version string is "1.1.8_005", the PC is not subject to this


Any other version string is not compatible with the OBAM versions

identified above, and indicates that you installed the Java Plug-in

from a source other than the OBAM versions mentioned above.  Check

with that source to determine whether your Java Plug-in is subject to

this vulnerability.

On each PC that has installed the Java Plug-in for Microsoft Windows

from a vulnerable HP-UX system, do one of the following:

    a.  Remove the Java Plug-in by opening Control Panel - Add/Remove

Programs, selecting "Java Plug-in 1.1.3" and choosing "Add/Remove".

Note that removing the Java Plug-in will disallow accessing

ServiceControl Manager from this PC.


    b.  Update the Java Plug-in by installing the fixed version, which

you downloaded in PART ONE above.  You can find instructions on how to

perform this installation at the following URL (substitute the

hostname of your Central Management Server where indicated):


Follow the "Configure Browser" link and re-install the Java Plug-in

on your PC.


   D. To subscribe to automatically receive future NEW HP Security

      Bulletins from the HP IT Resource Center via electronic mail,

      do the following:

      Use your browser to get to the HP IT Resource Center page



      Under the Maintenance and Support Menu (Electronic Support

      Center):  click on the "more..." link.  Then -

      Use the 'Login' tab at the left side of the screen to login

      using your ID and password.  Check with your system

      administrator to see if you have an existing login or use

      the "Register" button at the left to create a login.  You

      will need to login in order to gain access to many areas of

      the ITRC. Remember to save the User ID assigned to you, and

      your password.

      Under the Maintenance and Support Menu, click on the "more..."

      link.  Under the "Notifications" section (near the bottom of

      the page), select "Support Information Digests".

      To -subscribe- to future HP Security Bulletins or other

      Technical Digests, click the check box (in the left column)

      for the appropriate digest and then click the "Update

      Subscriptions" button at the bottom of the page.


      To -review- bulletins already released, select the link

      (in the middle column) for the appropriate digest.

      To -gain access- to the Security Patch Matrix, select

      the link for "hp security bulletins archive" near the bottom.

      Once in the archive the top link is to our current Security

      Patch Matrix.  Updated daily, this matrix categorizes security

      patches by platform/OS release, and by bulletin topic.

      The security patch matrix is also available via anonymous ftp:



      On the "Support Information Digest Main" page:

      click on the "HP Security Bulletin Archive".

   E. To report new security vulnerabilities, send email to


      Please encrypt any exploit information using the security-alert

      PGP key, available from your local key server, or by sending a

      message with a -subject- (not body) of 'get key' (no quotes) to


      Permission is granted for copying and circulating this Bulletin

      to Hewlett-Packard (HP) customers (or the Internet community)

      for the purpose of alerting them to problems, if and only if,

      the Bulletin is not edited or changed in any way, is attributed

      to HP, and provided such reproduction and/or distribution is

      performed for non-commercial purposes.

      Any other use of this information is prohibited. HP is not

      liable for any misuse of this information by any third party.


-----End of Document ID:  HPSBUX0011-132--------------------------------------

(C) 1999-2000 All rights reserved.