|
|
| |
Credit:
The information has been provided by Sami Koivu.
The original article can be found at: http://www.zerodayinitiative.com/advisories/ZDI-10-055/
|
| |
Vulnerable Systems:
Sun Microsystems Java Runtime Environment (JRE)
User interaction is required to exploit this vulnerability in that the target must run a malicious applet.
The specific flaw allows malicious applets to connect to network addresses other than the originating applet and client IPs. A handcrafted applet can override compile time checks to prevent compilation of a mutable InetAddress subclass. This results in the ability to circumvent the Applet SecurityManager restictions.
Patch Availability:
Sun Microsystems has issued an update to correct this vulnerability. More details can be found at:
http://www.oracle.com/technology/deploy/security/critical-patch-updates/javacpumar2010.html
CVE Information:
CVE-2010-0095
Disclosure Timeline:
2009-10-21 - Vulnerability reported to vendor
2010-04-05 - Coordinated public release of advisory
|
|
|