Argument injection vulnerability in the URI handler in (a) Java NPAPI plugin and (b) Java Deployment Toolkit in Java 6 Update 10, 19, and other versions, when running on Windows and possibly on Linux, allows remote attackers to execute arbitrary code via the (1) -J or (2) -XXaltjvm argument to javaws.exe, which is processed by the launch method. NOTE: some of these details are obtained from third party information.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
http://www.reversemode.com/index.php?option=com_content&task=view&id=67&Itemid=1 | exploit |
http://www.securitytracker.com/id?1023840 | vdb entry |
http://osvdb.org/63648 | vdb entry |
http://lists.grok.org.uk/pipermail/full-disclosure/2010-April/074036.html | mailing list |
http://secunia.com/advisories/39260 | third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/57615 | vdb entry |
http://www.kb.cert.org/vuls/id/886582 | third party advisory us government resource |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14090 | signature vdb entry |
http://www.vupen.com/english/advisories/2010/0853 | patch vendor advisory vdb entry |