diff options
-rw-r--r-- | security/vuxml/vuln.xml | 56 |
1 files changed, 56 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index b89fd1083008..31557fcb68c7 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,62 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="1489df94-6bcb-11d9-a21e-000a95bc6fae"> + <topic>opera -- multiple vulnerabilities in Java implementation</topic> + <affects> + <package> + <name>opera</name> + <name>opera-devel</name> + <name>linux-opera</name> + <range><lt>7.60.20041203</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Marc Schoenefeld reports:</p> + <blockquote cite="http://marc.theaimsgroup.com/?l=bugtraq&m=110088923127820"> + <p>Opera 7.54 is vulnerable to leakage of the java sandbox, + allowing malicious applets to gain unacceptable + privileges. This allows them to be used for information + gathering (spying) of local identity information and + system configurations as well as causing annoying crash + effects.</p> + <p>Opera 754 <em>[sic]</em> which was released Aug 5,2004 is + vulnerable to the XSLT processor covert channel attack, + which was corrected with JRE 1.4.2_05 [released in July + 04], but in disadvantage to the users the opera packaging + guys chose to bundle the JRE 1.4.2_04 <em>[...]</em></p> + <p>Internal pointer DoS exploitation: Opera.jar contains the + opera replacement of the java plugin. It therefore handles + communication between javascript and the Java VM via the + liveconnect protocol. The public class EcmaScriptObject + exposes a system memory pointer to the java address space, + by constructing a special variant of this type an internal + cache table can be polluted by false entries that infer + proper function of the JSObject class and in the following + proof-of-concept crash the browser.</p> + <p>Exposure of location of local java installation Sniffing + the URL classpath allows to retrieve the URLs of the + bootstrap class path and therefore the JDK installation + directory.</p> + <p>Exposure of local user name to an untrusted applet An + attacker could use the sun.security.krb5.Credentials class + to retrieve the name of the currently logged in user and + parse his home directory from the information which is + provided by the thrown + java.security.AccessControlException.</p> + </blockquote> + </body> + </description> + <references> + <mlist msgid="Pine.A41.4.58.0411191800510.57436@zivunix.uni-muenster.de">http://marc.theaimsgroup.com/?l=bugtraq&m=110088923127820</mlist> + </references> + <dates> + <discovery>2004-11-19</discovery> + <entry>2005-01-21</entry> + </dates> + </vuln> + <vuln vid="045944a0-6bca-11d9-aaa6-000a95bc6fae"> <topic>sudo -- environmental variable CDPATH is not cleared</topic> <affects> |