Durante este mes Sun en su blog ha estado reportando varias vulnerabilidades en Java. Entre ellas:

03 Oct 2007 Sun Alert 103078 Security Vulnerabilities in Java Runtime Environment May Allow Network Access Restrictions to be Circumvented
[1] A vulnerability in the Java Runtime Environment (JRE) may allow malicious Javascript code that is downloaded by a browser from a malicious website to make network connections, through Java APIs, to network services on machines other than the one that the Javascript code was downloaded from. This may allow network resources (such as web pages) and vulnerabilities (that exist on these network services) which are not otherwise normally accessible to be accessed or exploited.
[2] A second vulnerability in the JRE may allow an untrusted applet that is downloaded from a malicious website through a web proxy to make network connections to network services on machines other than the one that the applet was downloaded from. This may allow network resources (such as web pages) and vulnerabilities (that exist on these network services) which are not otherwise normally accessible to be accessed or exploited.

03 Oct 2007 Sun Alert 103071 Java Runtime Environment (JRE) May Allow Untrusted Applets or Applications to Display An Oversized Window so that the Warning Banner is Not Visible to User
When an untrusted applet or application displays a window, the Java Runtime Environment includes a warning banner inside the window to indicate that the applet or application is untrusted. A defect in the Java Runtime Environment may allow an untrusted applet or application that is downloaded from a malicious website to display a window that exceeds the size of a user's screen so that the warning banner is not visible to the user.

03 Oct 2007 Sun Alert 103072 An Untrusted Java Web Start Application or Java Applet May Move or Copy Arbitrary Files by Requesting the User to Drag and Drop a File from Application or Applet Window to a Desktop Application
A vulnerability in the Java Runtime Environment may allow an untrusted Java Web Start application or Java applet to move or copy arbitrary files on the system that the application or applet runs on, by requesting the user of the application or applet to drag a file from the application or applet window to a desktop application that has permissions to accept and write files on the system. To exploit this vulnerability, the application or applet has to successfully persuade the user to drag and drop the file.

03 Oct 2007 Sun Alert 103073 Multiple Security Vulnerabilities in Java Web Start Relating to Local File Access
[1] A vulnerability in Java Web Start may allow an untrusted application to read local files that are accessible to the user running the untrusted application.
[2] Two vulnerabilities in Java Web Start may allow an untrusted application to read and write local files that are accessible to the user running the untrusted application.
[3] Three vulnerabilities in Java Web Start may allow an untrusted application to determine the location of the Java Web Start cache.

03 Oct 2007 Sun Alert 103079 Security Vulnerability in Java Runtime Environment With Applet Caching May Allow Network Access Restrictions to be Circumvented
A vulnerability in the Java Runtime Environment (JRE) with applet caching may allow an untrusted applet that is downloaded from a malicious website to make network connections to network services on machines other than the one that the applet was downloaded from. This may allow network resources (such as web pages) and vulnerabilities (that exist on these network services) which are not otherwise normally accessible to be accessed or exploited.



Los parches para las respectivas plataformas son las siguientes:



Para 1.3, usar 1.3.1_21
Para 1.4, usar 1.4.2_16 --> http://java.sun.com/j2se/1.4.2/download.html
Para Java 5 usar el update 13 --> http://java.sun.com/javase/downloads/index_jdk5.jsp
Para Java 6 usar el update 3 (http://java.sun.com/javase/6/webnotes/ReleaseNotes.html)
Donwloads para Java 6 --> http://java.sun.com/javase/downloads/index.jsp