Vulnerability Note VU#544392
Sun Java Plugin may create temporary files with predictable names
The Sun Java Plugin may allow remote users to create files with arbitrary content in a specific location.
From the Sun Java Plugin page:
Java Plug-in technology, included as part of the Java 2 Runtime Environment, Standard Edition (JRE), establishes a connection between popular browsers and the Java platform. This connection enables applets on Web sites to be run within a browser on the desktop.
When running code, the Sun Java Plugin creates temporary files in a known location with a long file name for the classes being executed. These filenames are predictable when referenced by the "short" name, which provides compatibility with the older FAT filesystem used in some operating systems. For example, a file
may have a "short" (or "8.3") filename of
Normally, any temporary data stored by the Sun Java Plugin will contain a randomized string in the long filename:
However, the "short" name may discard the entire string:
In this manner, an attacker could create arbitrary content in a known location on a user's system, and use the data in conjunction with another unrelated exploit.
This flaw may not constitute a large security risk by itself. However, an attacker gains the ability to create arbitrary file data in a known location that may then be used in another unrelated attack.
The CERT/CC is currently unaware of a practical solution to this problem.
The Sun Java Plugin can be configured to use a nonstandard location for temporary files. This is accomplished in the Java Control Panel, by selecting the "Settings" button in the "Temporary Internet Files" section of the "General" tab.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Sun Microsystems Inc.||Affected||11 Feb 2005||11 Feb 2005|
CVSS Metrics (Learn More)
Thanks to Andreas Sandblad of Secunia Research for reporting this vulnerability.
This document was written by Ken MacInnis based primarily on information from Secunia.
- CVE IDs: Unknown
- Date Public: 08 Feb 2005
- Date First Published: 11 Feb 2005
- Date Last Updated: 11 Feb 2005
- Severity Metric: 5.78
- Document Revision: 9
If you have feedback, comments, or additional information about this vulnerability, please send us email.