Secunia Security Advisory - A security issue has been reported in Sun Java Studio Enterprise, which can be exploited by malicious, local users to gain escalated privileges.
34e0eabbd0048eb80a8d2fa33fd50a7ecc56d49cf5690743ae92210e1c8522c3
TITLE:
Sun Java Studio Enterprise Insecure File Permissions
SECUNIA ADVISORY ID:
SA19632
VERIFY ADVISORY:
http://secunia.com/advisories/19632/
CRITICAL:
Less critical
IMPACT:
Privilege escalation
WHERE:
Local system
SOFTWARE:
Sun Java Studio Enterprise 8.x
http://secunia.com/product/9354/
DESCRIPTION:
A security issue has been reported in Sun Java Studio Enterprise,
which can be exploited by malicious, local users to gain escalated
privileges.
The problem is that certain files are installed with world-writable
permissions when the product is installed by the "root" user. This
can be exploited to execute arbitrary code with the privileges of
other users.
SOLUTION:
Apply patches.
-- SPARC Platform --
Sun Java Studio Enterprise 8 (for Solaris 9 and Solaris 10):
http://sunsolve.sun.com/search/document.do?assetkey=urn:cds:docid:1-21-121045-04-1
-- x86 Platform --
Sun Java Studio Enterprise 8 (for Solaris 9 and Solaris 10):
http://sunsolve.sun.com/search/document.do?assetkey=urn:cds:docid:1-21-121045-04-1
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102292-1
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------