Check Point Reference: | CPAI-2004-200 |
Date Published: | 30 Nov 2009 |
Severity: | High |
Last Updated: | Monday 30 November, 2009 |
Source: | |
Industry Reference: | CVE-2004-1029 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | The Sun Java plug-in is a component of the Java 2 Runtime Environment. Sun's Java plug-in technology creates a connection between a Web browser and the Java platform. This connection enables Java applets, served from a Web site, to be run within a Web browser in a restricted environment, known as a sandbox. A vulnerability has been reported in the way Sun Java Plug-in isolates java applets from the host system. JavaScript or VBScript code can be used to bypass security restrictions in the access control mechanism, allowing a java applet to access restricted Java classes. An attacker can exploit this vulnerability to perform privileged operations on a target system. In the case of a successful attack, the target system will not exhibit any specific unusual behavior. The Java security restrictions will be bypassed leaving the system open to arbitrary code execution. The behavior of the attack target will depend entirely on the nature of the injected code. |
This protection will detect and block attempts to exploit this vulnerability
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Web Client Enforcement Violation.
Attack Information: Sun Java plug-in sandbox security bypass