Vulnerability Note VU#931684

Sun Java Management Extensions privilege escalation vulnerability

Original Release date: 02 Dec 2005 | Last revised: 12 Jan 2006


A vulnerability in the Sun Java Management Extensions API may allow a remote attacker to execute arbitrary code.


According to Sun Microsystems:

    Java Management Extensions (JMX) technology provides the tools for building distributed, Web-based, modular and dynamic solutions for managing and monitoring devices, applications, and service-driven networks.

An unspecified vulnerability in the JMX API may allow an untrusted Java applet to execute elevated privileges. For more information, please refer to Sun Alert 102017.


A remote attacker may be able to execute arbitrary code.


Upgrade Java
Sun addressed this issue in the Java Development Kit (JDK) and the Java Runtime Environment (JRE) 5.0 Update 4.

Do not access Java Applets from untrusted sources

Attackers must deliver a malicious Java applet to a vulnerable system in order to take advantage of this vulnerability. By only accessing Java applets from known and trusted sources the chances of exploitation are reduced.

Disable Java in web browser

Java applets are commonly executed within a web browser. Disabling Java within the web browser may prevent an attacker from delivering a malicious applet to a vulnerable system.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Sun Microsystems, Inc.Affected29 Nov 200530 Nov 2005
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



This vulnerability was reported by Sun Microsystems. Sun credits Adam Gowdiak with providing information regarding this issue.

This document was written by Jeff Gennari.

Other Information

  • CVE IDs: CVE-2005-3904
  • Date Public: 28 Nov 2005
  • Date First Published: 02 Dec 2005
  • Date Last Updated: 12 Jan 2006
  • Severity Metric: 9.00
  • Document Revision: 33


If you have feedback, comments, or additional information about this vulnerability, please send us email.