diff options
Diffstat (limited to 'metadata/glsa/glsa-200705-20.xml')
-rw-r--r-- | metadata/glsa/glsa-200705-20.xml | 87 |
1 files changed, 87 insertions, 0 deletions
diff --git a/metadata/glsa/glsa-200705-20.xml b/metadata/glsa/glsa-200705-20.xml new file mode 100644 index 000000000000..5a391a0b317b --- /dev/null +++ b/metadata/glsa/glsa-200705-20.xml @@ -0,0 +1,87 @@ +<?xml version="1.0" encoding="utf-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="200705-20"> + <title>Blackdown Java: Applet privilege escalation</title> + <synopsis> + The Blackdown JDK and the Blackdown JRE suffer from the multiple + unspecified vulnerabilities that already affected the Sun JDK and JRE. + </synopsis> + <product type="ebuild">blackdown-jdk,blackdown-jre</product> + <announced>2007-05-26</announced> + <revised>2007-05-26: 01</revised> + <bug>161835</bug> + <access>remote</access> + <affected> + <package name="dev-java/blackdown-jdk" auto="yes" arch="*"> + <unaffected range="ge">1.4.2.03-r14</unaffected> + <vulnerable range="lt">1.4.2.03-r14</vulnerable> + </package> + <package name="dev-java/blackdown-jre" auto="yes" arch="*"> + <unaffected range="ge">1.4.2.03-r14</unaffected> + <vulnerable range="lt">1.4.2.03-r14</vulnerable> + </package> + </affected> + <background> + <p> + Blackdown provides implementations of the Java Development Kit (JDK) + and the Java Runtime Environment (JRE). + </p> + </background> + <description> + <p> + Chris Evans has discovered multiple buffer overflows in the Sun JDK and + the Sun JRE possibly related to various AWT and font layout functions. + Tom Hawtin has discovered an unspecified vulnerability in the Sun JDK + and the Sun JRE relating to unintended applet data access. He has also + discovered multiple other unspecified vulnerabilities in the Sun JDK + and the Sun JRE allowing unintended Java applet or application resource + acquisition. Additionally, a memory corruption error has been found in + the handling of GIF images with zero width field blocks. + </p> + </description> + <impact type="normal"> + <p> + An attacker could entice a user to run a specially crafted Java applet + or application that could read, write, or execute local files with the + privileges of the user running the JVM, access data maintained in other + Java applets, or escalate the privileges of the currently running Java + applet or application allowing for unauthorized access to system + resources. + </p> + </impact> + <workaround> + <p> + Disable the "nsplugin" USE flag in order to prevent web applets from + being run. + </p> + </workaround> + <resolution> + <p> + Since there is no fixed update from Blackdown and since the flaw only + occurs in the applets, the "nsplugin" USE flag has been masked in the + portage tree. Emerge the ebuild again in order to fix the + vulnerability. Another solution is to switch to another Java + implementation such as the Sun implementation (dev-java/sun-jdk and + dev-java/sun-jre-bin). + </p> + <code> + # emerge --sync + # emerge --ask --oneshot --verbose "dev-java/blackdown-jdk" + # emerge --ask --oneshot --verbose "dev-java/blackdown-jre"</code> + </resolution> + <references> + <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6731">CVE-2006-6731</uri> + <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6736">CVE-2006-6736</uri> + <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6737">CVE-2006-6737</uri> + <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6745">CVE-2006-6745</uri> + </references> + <metadata tag="requester" timestamp="2007-05-03T18:56:59Z"> + jaervosz + </metadata> + <metadata tag="submitter" timestamp="2007-05-06T22:34:22Z"> + falco + </metadata> + <metadata tag="bugReady" timestamp="2007-05-21T21:16:03Z"> + falco + </metadata> +</glsa> |