|
|
|
|
| |
Credit:
The information has been provided by Chris Ries.
The original article can be found at: http://www.zerodayinitiative.com/advisories/ZDI-11-192/
|
| |
Vulnerable Systems:
* Oracle Java Runtime
User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the way Java webstart parses certain properties from the jnlp file. Due to insufficient quote escaping it is possible to supply additional command line parameters to the java process. By crafting such parameters, an attacker can execute remote code under the context of the user running the process.
Patch Availability:
Oracle has issued an update to correct this vulnerability. More details can be found at:
http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html
CVE Information:
CVE-2011-0863
Disclosure Timeline:
2011-01-21 - Vulnerability reported to vendor
2011-06-08 - Coordinated public release of advisory
|
|
|
|
|