Bug 436029 (CVE-2008-1185, CVE-2008-1186)

Summary: CVE-2008-1185 Untrusted applet and application privilege escalation (CVE-2008-1186)
Product: [Other] Security Response Reporter: Marc Schoenefeld <mschoene>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: kreilly, vdanen
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
URL: http://sunsolve.sun.com/search/document.do?assetkey=1-66-233321-1
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2010-12-20 21:45:56 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 436133, 436134    
Bug Blocks:    

Description Marc Schoenefeld 2008-03-04 21:59:35 UTC
Part of http://www.securityfocus.com/bid/28083/discuss (1/7)

Sun Java SE March 2008 Advance Notification of Multiple Vulnerabilities

Sun has released an advance notification for security updates for Java SE. The
notification indicates that seven advisories addressing multiple vulnerabilities
will be released on March 4, 2008. The issues affect the following:

JDK and JRE 6 Update 5
JDK and JRE 5.0 Update 15
SDK and JRE 1.4.2_17
SDK and JRE 1.3.1_22
The following Sun Alerts corresponding to these updates will be released after
the updates are available:

2233321
2233322
2233323
2233324
2233325
2233326
2233327

Comment 2 Marc Schoenefeld 2008-03-06 11:15:00 UTC
Two security vulnerabilities in the Java Runtime Environment Virtual Machine may
independently allow an untrusted application or applet that is downloaded from a
website to elevate its privileges. For example, the application or applet may
grant itself permissions to read and write local files or execute local
applications that are accessible to the user running the untrusted application
or applet.

Comment 3 Vincent Danen 2010-12-20 21:45:56 UTC
This was addressed in:

Red Hat Enterprise Linux version 4 Extras (RHSA-2008:0186)
RHEL Supplementary version 5 (RHSA-2008:0186)