Sun has acknowledged a security issue in Sun Java Runtime Environment (JRE), which can be exploited by malicious people to bypass certain security restrictions.
The security issue is caused due to the JRE processing external XML entity references even though the "external general entities" property is set to FALSE. This can be exploited to e.g. access certain URLs or cause a DoS (Denial of Service) via malicious XML documents.
Successful exploitation requires that malicious XML data is processed within a trusted applet or Java Web Start application.
The security issue is reported in Sun JDK and JRE 6 Update 3 and earlier. Sun JDK and JRE 5.0, and SDK and JRE 1.4.x and 1.3.x are reportedly not affected.
Solution: Update to JDK or JRE 6 Update 4 or later.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: Sun Java Runtime Environment External XML Entities Security Bypass
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.