Date: Wed, 23 Dec 2009 13:37:16 GMT From: Romain Dalmaso <artefact2@gmail.com> To: freebsd-gnats-submit@FreeBSD.org Subject: java/141919: Serious remote vulnerability in the JRE Message-ID: <200912231337.nBNDbGvJ070848@www.freebsd.org> Resent-Message-ID: <200912231340.nBNDe63b062347@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 141919 >Category: java >Synopsis: Serious remote vulnerability in the JRE >Confidential: no >Severity: critical >Priority: high >Responsible: freebsd-java >State: open >Quarter: >Keywords: >Date-Required: >Class: update >Submitter-Id: current-users >Arrival-Date: Wed Dec 23 13:40:06 UTC 2009 >Closed-Date: >Last-Modified: >Originator: Romain Dalmaso >Release: 7.2-RELEASE >Organization: >Environment: >Description: A serious vulnerability affecting all the current Java ports allows any potential attacker to take control of the machine remotely if it uses a Java application dealing with the XML parser. The issue has been there for months, and has been fixed since Java 6 update 15 and Java 5 update 20. So simply updating the port would solve the issue. This vulnerability affects, for instance, all the Freenet nodes running under FreeBSD : http://freenetproject.org/news.html#xml-vuln More details about it : http://www.cert.fi/en/reports/2009/vulnerability2009085.html Thanks for your interest. >How-To-Repeat: >Fix: >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200912231337.nBNDbGvJ070848>