Vulnerability Name:
CVE-2006-0616 (CCN-24561)
Assigned:
2006-02-07
Published:
2006-02-07
Updated:
2017-07-20
Summary:
Unspecified vulnerability in Sun Java JDK and JRE 5.0 Update 4 and earlier allows remote attackers to bypass Java sandbox security and obtain privileges via unspecified vectors involving the reflection APIs, aka the "fourth issue."
CVSS v3 Severity:
5.6 Medium
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
)
Exploitability Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
High
Privileges Required (PR):
None
User Interaction (UI):
None
Scope:
Scope (S):
Unchanged
Impact Metrics:
Confidentiality (C):
Low
Integrity (I):
Low
Availibility (A):
Low
CVSS v2 Severity:
4.0 Medium
(CVSS v2 Vector:
AV:N/AC:H/Au:N/C:P/I:P/A:N
)
3.0 Low
(Temporal CVSS v2 Vector:
AV:N/AC:H/Au:N/C:P/I:P/A:N/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
High
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
Partial
Integrity (I):
Partial
Availibility (A):
None
5.1 Medium
(CCN CVSS v2 Vector:
AV:N/AC:H/Au:N/C:P/I:P/A:P
)
3.8 Low
(CCN Temporal CVSS v2 Vector:
AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
High
Athentication (Au):
None
Impact Metrics:
Confidentiality (C):
Partial
Integrity (I):
Partial
Availibility (A):
Partial
Vulnerability Type:
CWE-Other
Vulnerability Consequences:
Gain Access
References:
Source: MITRE
Type: CNA
CVE-2006-0614
Source: MITRE
Type: CNA
CVE-2006-0615
Source: MITRE
Type: CNA
CVE-2006-0616
Source: MITRE
Type: CNA
CVE-2006-0617
Source: CCN
Type: APPLE-SA-2006-04-18 J2SE 5.0 Release 4
About the security content of J2SE 5.0 Release 4
Source: CONFIRM
Type: UNKNOWN
http://docs.info.apple.com/article.html?artnum=303658
Source: CCN
Type: SA18760
Sun Java JRE "reflection" APIs Sandbox Security Bypass Vulnerabilities
Source: SECUNIA
Type: Patch, Vendor Advisory
18760
Source: SECUNIA
Type: UNKNOWN
18884
Source: CCN
Type: SECTRACK ID: 1015596
Sun Java Runtime Environment (JRE) Reflection API Multiple Bugs Let Applets Gain Elevated Privileges
Source: SECTRACK
Type: UNKNOWN
1015596
Source: CCN
Type: Sun Alert ID: 102171
Security Vulnerabilities in the Java Runtime Environment may Allow an Untrusted Applet to Elevate its Privileges
Source: SUNALERT
Type: Patch, Vendor Advisory
102171
Source: CCN
Type: GLSA-200602-07
Sun JDK/JRE: Applet privilege escalation
Source: GENTOO
Type: UNKNOWN
GLSA-200602-07
Source: CCN
Type: US-CERT VU#759996
Sun Java Reflection API security bypass vulnerabilities
Source: CERT-VN
Type: US Government Resource
VU#759996
Source: CCN
Type: OSVDB ID: 23091
Sun Java JRE Unspecified reflection API Privilege Escalation (6277246)
Source: CCN
Type: OSVDB ID: 23092
Sun Java JRE Unspecified reflection API Privilege Escalation (6316316)
Source: CCN
Type: OSVDB ID: 23093
Sun Java JRE Unspecified reflection API Privilege Escalation (6316314)
Source: CCN
Type: OSVDB ID: 23094
Sun Java JRE Unspecified reflection API Privilege Escalation (6316322)
Source: CCN
Type: OSVDB ID: 23095
Sun Java JRE Unspecified reflection API Privilege Escalation (6343309)
Source: CCN
Type: OSVDB ID: 23096
Sun Java JRE Unspecified reflection API Privilege Escalation (6343350)
Source: CCN
Type: OSVDB ID: 23097
Sun Java JRE Unspecified reflection API Privilege Escalation (6343342)
Source: CCN
Type: TLSA-2006-4
Multiple vulnerabilities exist in Java
Source: VUPEN
Type: UNKNOWN
ADV-2006-0467
Source: VUPEN
Type: UNKNOWN
ADV-2006-0828
Source: VUPEN
Type: UNKNOWN
ADV-2006-1398
Source: XF
Type: UNKNOWN
sun-jre-reflection-privilege-elevation(24561)
Source: XF
Type: UNKNOWN
sun-jre-reflection-privilege-elevation(24561)
Vulnerable Configuration:
Configuration 1
:
cpe:/a:sun:jdk:*:update4:*:*:*:*:*:*
(Version <= 1.5.0)
OR
cpe:/a:sun:jre:*:update4:*:*:*:*:*:*
(Version <= 1.5.0)
Configuration CCN 1
:
cpe:/a:sun:jre:1.3.1:-:*:*:*:*:*:*
OR
cpe:/a:sun:jre:1.4.2:-:*:*:*:*:*:*
OR
cpe:/a:sun:jre:1.5.0:-:*:*:*:*:*:*
OR
cpe:/a:sun:sdk:1.4.2:*:*:*:*:*:*:*
OR
cpe:/a:sun:jre:1.5.0:update3:*:*:*:*:*:*
OR
cpe:/a:sun:jdk:1.5.0:-:*:*:*:*:*:*
OR
cpe:/a:sun:jdk:1.5.0:update1:*:*:*:*:*:*
OR
cpe:/a:sun:jdk:1.5.0:update2:*:*:*:*:*:*
OR
cpe:/a:sun:jdk:1.5.0:update3:*:*:*:*:*:*
OR
cpe:/a:sun:jdk:1.5.0:update4:*:*:*:*:*:*
OR
cpe:/a:sun:jdk:1.5.0:update5:*:*:*:*:*:*
OR
cpe:/a:sun:jre:1.3.1:update1:*:*:*:*:*:*
OR
cpe:/a:sun:jre:1.3.1:update15:*:*:*:*:*:*
OR
cpe:/a:sun:jre:1.3.1:update16:*:*:*:*:*:*
OR
cpe:/a:sun:jre:1.3.1:update1a:*:*:*:*:*:*
OR
cpe:/a:sun:jre:1.3.1:update4:*:*:*:*:*:*
OR
cpe:/a:sun:jre:1.3.1:update8:*:*:*:*:*:*
OR
cpe:/a:sun:jre:1.4.2:update1:linux:*:*:*:*:*
OR
cpe:/a:sun:jre:1.4.2:update2:linux:*:*:*:*:*
OR
cpe:/a:sun:jre:1.4.2:update3:linux:*:*:*:*:*
OR
cpe:/a:sun:jre:1.4.2:update4:linux:*:*:*:*:*
OR
cpe:/a:sun:jre:1.4.2:update5:linux:*:*:*:*:*
OR
cpe:/a:sun:jre:1.5.0:update1:*:*:*:*:*:*
OR
cpe:/a:sun:jre:1.5.0:update2:*:*:*:*:*:*
OR
cpe:/a:sun:jre:1.5.0:update4:*:*:*:*:*:*
OR
cpe:/a:sun:jre:1.5.0:update5:*:*:*:*:*:*
OR
cpe:/a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*
OR
cpe:/a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*
OR
cpe:/a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*
OR
cpe:/a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*
OR
cpe:/a:sun:sdk:1.4.2_08:*:*:*:*:*:*:*
OR
cpe:/a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*
OR
cpe:/a:sun:sdk:1.4.2_04:*:*:*:*:*:*:*
OR
cpe:/a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*
OR
cpe:/a:sun:sdk:1.4.2_05:*:*:*:*:*:*:*
OR
cpe:/a:sun:sdk:1.4.2_06:*:*:*:*:*:*:*
OR
cpe:/a:sun:sdk:1.4.2_07:*:*:*:*:*:*:*
OR
cpe:/a:sun:sdk:1.4.2_01:*:*:*:*:*:*:*
OR
cpe:/a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*
OR
cpe:/a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*
OR
cpe:/a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*
OR
cpe:/a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*
OR
cpe:/a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*
OR
cpe:/a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*
OR
cpe:/a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*
OR
cpe:/a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*
OR
cpe:/a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*
OR
cpe:/a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*
OR
cpe:/a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*
OR
cpe:/a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*
OR
cpe:/a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*
OR
cpe:/a:sun:jre:1.3.1:update2:*:*:*:*:*:*
OR
cpe:/a:sun:jre:1.3.1:update12:*:*:*:*:*:*
OR
cpe:/a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*
AND
cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*
Denotes that component is vulnerable
BACK
sun
jdk * update4
sun
jre * update4
sun
jre 1.3.1
sun
jre 1.4.2
sun
jre 1.5.0
sun
sdk 1.4.2
sun
jre 1.5.0 update3
sun
jdk 1.5.0
sun
jdk 1.5.0 update1
sun
jdk 1.5.0 update2
sun
jdk 1.5.0 update3
sun
jdk 1.5.0 update4
sun
jdk 1.5.0 update5
sun
jre 1.3.1 update1
sun
jre 1.3.1 update15
sun
jre 1.3.1 update16
sun
jre 1.3.1 update1a
sun
jre 1.3.1 update4
sun
jre 1.3.1 update8
sun
jre 1.4.2 update1
sun
jre 1.4.2 update2
sun
jre 1.4.2 update3
sun
jre 1.4.2 update4
sun
jre 1.4.2 update5
sun
jre 1.5.0 update1
sun
jre 1.5.0 update2
sun
jre 1.5.0 update4
sun
jre 1.5.0 update5
sun
sdk 1.3.1_01
sun
sdk 1.3.1_01a
sun
sdk 1.3.1_16
sun
sdk 1.4.2_03
sun
sdk 1.4.2_08
sun
sdk 1.4.2_09
sun
sdk 1.4.2_04
sun
sdk 1.4.2_02
sun
sdk 1.4.2_05
sun
sdk 1.4.2_06
sun
sdk 1.4.2_07
sun
sdk 1.4.2_01
sun
sdk 1.3.1_02
sun
sdk 1.3.1_04
sun
sdk 1.3.1_05
sun
sdk 1.3.1_06
sun
sdk 1.3.1_07
sun
sdk 1.3.1_08
sun
sdk 1.3.1_09
sun
sdk 1.3.1_10
sun
sdk 1.3.1_11
sun
sdk 1.3.1_12
sun
sdk 1.3.1_13
sun
sdk 1.3.1_14
sun
sdk 1.3.1_15
sun
jre 1.3.1 update2
sun
jre 1.3.1 update12
sun
sdk 1.3.1_03
gentoo
linux *
apple
mac os x 10.4.5
apple
mac os x server 10.4.5