The Sun Java Plugin may allow remote users to create files with arbitrary content in a specific location.
From the Sun Java Plugin page:
Java Plug-in technology, included as part of the Java 2 Runtime Environment, Standard Edition (JRE), establishes a connection between popular browsers and the Java platform. This connection enables applets on Web sites to be run within a browser on the desktop.
This flaw may not constitute a large security risk by itself. However, an attacker gains the ability to create arbitrary file data in a known location that may then be used in another unrelated attack.
The CERT/CC is currently unaware of a practical solution to this problem.
The Sun Java Plugin can be configured to use a nonstandard location for temporary files. This is accomplished in the Java Control Panel, by selecting the "Settings" button in the "Temporary Internet Files" section of the "General" tab.
Thanks to Andreas Sandblad of Secunia Research for reporting this vulnerability.
This document was written by Ken MacInnis based primarily on information from Secunia.
|Date First Published:||2005-02-11|
|Date Last Updated:||2005-02-11 21:13 UTC|