Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 23 Dec 2009 13:37:16 GMT
From:      Romain Dalmaso <artefact2@gmail.com>
To:        freebsd-gnats-submit@FreeBSD.org
Subject:   java/141919: Serious remote vulnerability in the JRE
Message-ID:  <200912231337.nBNDbGvJ070848@www.freebsd.org>
Resent-Message-ID: <200912231340.nBNDe63b062347@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         141919
>Category:       java
>Synopsis:       Serious remote vulnerability in the JRE
>Confidential:   no
>Severity:       critical
>Priority:       high
>Responsible:    freebsd-java
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          update
>Submitter-Id:   current-users
>Arrival-Date:   Wed Dec 23 13:40:06 UTC 2009
>Closed-Date:
>Last-Modified:
>Originator:     Romain Dalmaso
>Release:        7.2-RELEASE
>Organization:
>Environment:
>Description:
A serious vulnerability affecting all the current Java ports allows any potential attacker to take control of the machine remotely if it uses a Java application dealing with the XML parser.

The issue has been there for months, and has been fixed since Java 6 update 15 and Java 5 update 20. So simply updating the port would solve the issue.

This vulnerability affects, for instance, all the Freenet nodes running under FreeBSD : 
http://freenetproject.org/news.html#xml-vuln

More details about it : 
http://www.cert.fi/en/reports/2009/vulnerability2009085.html

Thanks for your interest.
>How-To-Repeat:

>Fix:


>Release-Note:
>Audit-Trail:
>Unformatted:



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200912231337.nBNDbGvJ070848>