HTTP: Sun Java Runtime Environment JAR File Processing Stack Buffer Overflow

This signature detects attempts to exploit a known stack buffer overflow vulnerability in Sun Java Runtime Environment software. It is due to insufficient validation while processing Java ARchive (JAR) files. A remote attacker can exploit this by enticing a target user to open a crafted JAR file. A successful attack can lead to arbitrary code execution on the target. The behavior of the target is entirely dependent on the intended function of the injected code and executes within the security context of the logged in user. In an unsuccessful attack, the affected process terminates abnormally.

Extended Description

Sun Java Runtime Environment and Java Development Kit are prone to multiple security vulnerabilities. Successful exploits may allow attackers to violate the same-origin policy, obtain sensitive information, bypass security restrictions, run untrusted applets with elevated privileges, and cause denial-of-service conditions. This may result in a compromise of affected computers. These issues affect versions *prior to* the following: JDK and JRE 6 Update 11 JDK and JRE 5.0 Update 17 SDK and JRE 1.4.2_19 SDK and JRE 1.3.1_24

Affected Products

Nortel_networks self-service_speech_server,Avaya interactive_response

Short Name
HTTP:STC:JAVA:JAR-PROCESS-OF
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Buffer CVE-2008-5354 Environment File JAR Java Overflow Processing Runtime Stack Sun bid:32608
Release Date
10/20/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3339
False Positive
Unknown
Vendors

Red_hat

Suse

Apple

Gentoo

Sun

Hp

Avaya

Pardus

Ubuntu

Nortel_networks

Vmware

CVSS Score

9.3

Found a potential security threat?