Skip navigation.
Arch2Arch Tab BEA.com

Security Advisories and Notifications

Subject: Security Advisory (BEA07-177.00)
From: BEA Systems Inc.
Minor Subject: Multiple Security Vulnerabilities in the Java Runtime Environment
Product(s) Affected: BEA JRockit and BEA Products Using JRockit

Threat level: High
Multiple security vulnerabilities found that might cause applets or applications to elevate their privileges or execute arbitary code.

Severity: High
An attacker could elevate their privileges or execute arbitary code.

Problems were identified that could potentially cause a security vulnerability in certain versions of JRockit. Upgrades are available to correct this problem (see Section II). BEA Systems treats potential security problems with a high degree of urgency and endeavors to take appropriate steps to help ensure the security of our customers' systems. As a result, BEA Systems strongly suggests the following actions:

I. Read the following advisory.
II. Apply the suggested action.
III. If you know of any additional users interested in future security advisories, please forward them the registration instructions included in this advisory.

I. Advisory

This is a combined security advisory for Sun Security Alerts #102958, #102934, #103024, #102993 and #102995

Sun Alert #102958

A defect in the Javadoc tool in various releases of the JDK may lead to the generation of HTML documentation pages which contain a potential cross-site scripting (XSS) vulnerability. This may allow a remote user to gain access to cookies from the website that hosts the generated documentation.

JDK 6
JDK 5.0 Update 11 and earlier

Sun Microsystems advised of this JRE vulnerability at
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102958-1

Sun Alert #102934

A buffer overflow vulnerability in the image parsing code in the Java Runtime Environment may allow an untrusted applet or application to elevate its privileges. For example, an applet may grant itself permissions to read and write local files or execute local applications that are accessible to the user running the untrusted applet.

JDK and JRE 6
JDK and JRE 5.0 Update 10 and earlier
SDK and JRE 1.4.2_14 and earlier
SDK and JRE 1.3.1_20 and earlier

A second vulnerability may allow an untrusted applet or application to cause the Java Virtual Machine to hang.

JDK and JRE 6
JDK and JRE 5.0 Update 10 and earlier
SDK and JRE 1.4.2_14 and earlier
SDK and JRE 1.3.1_19 and earlier

Sun Microsystems advised of this JRE vulnerability at
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102934-1

Sun Alert #103024

A vulnerability in the font parsing code in the Java(TM) Runtime Environment may allow an untrusted applet to elevate its privileges. For example, an applet may grant itself permissions to read and write local files or execute local applications that are accessible to the user running the untrusted applet.

JDK and JRE 5.0 Update 9 and earlier
SDK and JRE 1.4.2_14 and earlier

Sun Microsystems advised of this JRE vulnerability at
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103024-1

Sun Security Alert #102993

The Java XML Digital Signature implementation that is included in the JDK and JRE 6 release does not securely process XSLT stylesheets contained in XSLT Transforms in XML Signatures. This could lead to the execution of arbitrary code with the permissions of the application processing XML signatures that include these XSLT stylesheets.

JDK and JRE 6 Update 1 and earlier

Sun Microsystems advised of this JRE vulnerability at
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102993-1

Sun Security Alert #102995

A security vulnerability in the Java Runtime Environment Applet Class Loader may allow an untrusted applet that is loaded from a remote system to circumvent network access restrictions and establish socket connections to certain services running on the local host, as if it were loaded from the system that the applet is running on. This may allow the untrusted remote applet the ability to exploit any security vulnerabilities existing in the services it has connected to.

JDK and JRE 6 Update 1 and earlier
JDK and JRE 5.0 Update 11 and earlier
SDK and JRE 1.4.2_14 and earlier

Sun Microsystems advised of this JRE vulnerability at
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102995-1

Impact and CVSS Ratings:

The issues described above are rated equally:

CVSS Severity Score: 5.3 (Medium)
Attack Range (AV): Remote
Attack Complexity (AC): High
Authentication Level (Au): Not Required
Impact Type: Unauthorized access. Partial confidentiality and integrity violation
Vulnerability Type: Elevation of Privilege, Execution of Arbitrary Code
CVSS Base Score Vector: (AV:R/AC:H/Au:NR/C:C/I:C/A:N/B:N)

Complete CVSS Guide: http://www.first.org/cvss/cvss-guide.html
Online Calculator: http://nvd.nist.gov/cvss.cfm?calculator

The following versions of BEA JRockit are affected by this vulnerability

BEA JRockit R27.3.1 or prior using

JDK and JRE 6 Update 1 and earlier
JDK and JRE 5.0 Update 11 and earlier
SDK and JRE 1.4.2 Update 14 and earlier

BEA JRockit 7.0 SP6 RP1 or prior using JRE 1.3.1_20 and earlier

II. SUGGESTED ACTION

BEA Systems strongly recommends the following course of actions.

For JDK 1.4.2 JDK, 1.5.0 or JDK 6:

1. If you are using JRockit release R27.3.1 or earlier, download the appropriate patch from the following location and save the downloaded patch to a temporary directory:

JRockit 1.4.2 R27.3.1 JDK Linux (x86 - 32 bit):
ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-jdk1.4.2_14-linux_ia32.tar.gz

JRockit 5.0 R27.3.1 JDK Linux (x86 - 32 bit):
ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-jdk1.5.0_11-linux_ia32.tar.gz

JRockit 6 R27.3.1 JDK Linux (x86 - 32 bit):
ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-jdk1.6.0_01-linux_ia32.tar.gz

JRockit 5.0 R27.3.1 JDK Linux (Intel EM64T & AMD64 - 64 bit):
ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-jdk1.5.0_11-linux_x86_64.tar.gz

JRockit 6 R27.3.1 JDK Linux (Intel EM64T & AMD64 - 64 bit):
ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-jdk1.6.0_01-linux_x86_64.tar.gz

JRockit 1.4.2 R27.3.1 JDK Linux (Intel Itanium - 64 bit):
ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-jdk1.4.2_14-linux_ia64.tar.gz

JRockit 5.0 R27.3.1 JDK Linux (Intel Itanium - 64-bit):
ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-jdk1.5.0_11-linux_ia64.tar.gz

JRockit 1.4.2 R27.3.1 JDK Sun Solaris (SPARC - 64 bit):
ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-jdk1.4.2_14-solaris_sparcv9.tar.gz

JRockit 5.0 R27.3.1 JDK Solaris (SPARC - 64-bit):
ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-jdk1.5.0_11-solaris_sparcv9.tar.gz

BEA JRockit 1.4.2 R27.3.1 JDK Microsoft Windows (x86 - 32 bit):
ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-jdk1.4.2_14-windows_ia32.zip

JRockit 5.0 R27.3.1 JDK Microsoft Windows (x86 - 32 bit):
ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-jdk1.5.0_11-windows_ia32.zip

JRockit 6 R27.3.1 JDK Microsoft Windows (x86 - 32 bit):
ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-jdk1.6.0_01-windows_ia32.zip

JRockit 5.0 R27.3.1 JDK Microsoft Windows (Intel EM64T & AMD64 - 64 bit):
ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-jdk1.5.0_11-windows_x86_64.zip

JRockit 6 R27.3.1 JDK Microsoft Windows (Intel EM64T & AMD64 - 64 bit):
ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-jdk1.6.0_01-windows_x86_64.zip

JRockit 1.4.2 R27.3.1 JDK Microsoft Windows (Intel Itanium - 64 bit):
ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-jdk1.4.2_14-windows_ia64.zip

JRockit 5.0 R27.3.1 JDK Microsoft Windows (Intel Itanium - 64 bit):
ftp://anonymous:dev2dev%40bea.com@ftpna.bea.com/pub/releases/security/jrockit-jdk1.5.0_11-windows_ia64.zip

2. Unpack the package using unzip on Windows and tar on Linux and Solaris. This package contains the complete JRockit installation. The existing JRockit installation needs to be replaced with the patched installation.

3. Save the current JRockit installation to a new location.

4. Replace the current JRockit installation with the files from the patch.

5. Restart the server.

Note: It is highly recommended that the original files be saved before updating them with the patched files.

For JRE 1.3.1

Sun has currently not released a patch for JRE 1.3.1

BEA strongly suggests that customers apply the remedies recommended in all our security advisories. BEA also urges customers to apply every Service/Maintenance Pack as they are released. Service/Maintenance Packs include a roll-up of all bug fixes for each version of the product, as well as each of the prior Service/Maintenance Packs. Service/Maintenance Packs and information about them can be found at:

BEA JRockit:
http://commerce.bea.com/products/weblogicjrockit/jrockit_prod_fam.jsp

WebLogic Server:
http://commerce.bea.com/showallversions.jsp?family=WLS

WebLogic Platform:
http://commerce.bea.com/showallversions.jsp?family=WLP

Note: Information about securing WebLogic Server and WebLogic Express can be found at
http://edocs.bea.com/wls/docs81/security.html. Specific lockdown information is provided at http://edocs.bea.com/wls/docs81/lockdown/index.html. We strongly encourage you to review this documentation to ensure your server deployment is securely configured.

III. FUTURE SECURITY COMMUNICATIONS

If there are security-related issues with BEA product, BEA Systems generally distributes an advisory and instructions with a recommended course of action. Because the security of your site, data, and code is a high priority, we are committed to generally communicating security-related issues to our customers and partners.

All previous advisories can be viewed at http://dev2dev.bea.com/advisoriesnotifications/

BEA Systems has established an opt-in emailing list specifically targeted for product security advisories and notifications. As a policy, if a user has opted-in to our emailing list and there is a relevant security issue with the BEA product(s) he/she is using, BEA generally distributes an advisory and instructions via email with a recommended course of action.

ADDITIONAL USERS WHO WISH TO REGISTER FOR ADVISORY DISTRIBUTION SHOULD FOLLOW THE REGISTRATION DIRECTIONS AT http://dev2dev.bea.com/advisoriesnotifications/

IV. REPORTING SECURITY ISSUES

Security issues can be reported to BEA Systems by sending email to secalert@bea.com or by following the directions at http://dev2dev.bea.com/advisoriesnotifications/. If BEA has validated a reported security issue, we will endeavor to assess the severity of the impact of the security issue and the likelihood of the exploitation of the vulnerability. Based on these assessments and other factors, BEA will endeavor to develop and appropriately prioritize a workaround or patch designed to reduce or eliminate the risk of the vulnerability.

If you have any questions or care to verify the authenticity of this advisory, please contact BEA Technical Support at support@bea.com

Thank you,
BEA Systems, Inc.