CVE-2007-3504
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Directory traversal vulnerability in the PersistenceService in Sun Java Web Start in JDK and JRE 5.0 Update 11 and earlier, and Java Web Start in SDK and JRE 1.4.2_13 and earlier, for Windows allows remote attackers to perform unauthorized actions via an application that grants file overwrite privileges to itself. NOTE: this can be leveraged to execute arbitrary code by overwriting a .java.policy file.
Una vulnerabilidad de salto de directorio en PersistenceService en Sun Java Web Start en JDK y JRE versión 5.0 Update 11 y anteriores, y Java Web Start en SDK y JRE versión 1.4.2_13 y anteriores, para Windows, permite a atacantes remotos realizar acciones no autorizadas por medio de una aplicación que otorga privilegios de sobrescritura de archivos a sí mismo. NOTA: esto puede ser aprovechado para ejecutar código arbitrario sobrescribiendo un archivo .java.policy.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2007-06-29 CVE Reserved
- 2007-06-30 CVE Published
- 2024-03-26 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (12)
URL | Tag | Source |
---|---|---|
http://docs.info.apple.com/article.html?artnum=307177 | X_refsource_misc | |
http://osvdb.org/37755 | Vdb Entry | |
http://www.securityfocus.com/archive/1/472673/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/24695 | Vdb Entry | |
http://www.securitytracker.com/id?1018328 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/35169 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102957-1 | 2018-10-15 |
URL | Date | SRC |
---|---|---|
http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html | 2018-10-15 | |
http://secunia.com/advisories/25823 | 2018-10-15 | |
http://secunia.com/advisories/28115 | 2018-10-15 | |
http://www.vupen.com/english/advisories/2007/2384 | 2018-10-15 | |
http://www.vupen.com/english/advisories/2007/4224 | 2018-10-15 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Sun Search vendor "Sun" | Jdk Search vendor "Sun" for product "Jdk" | <= 1.5.0 Search vendor "Sun" for product "Jdk" and version " <= 1.5.0" | update11 |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | * | - |
Safe
|
Sun Search vendor "Sun" | Jre Search vendor "Sun" for product "Jre" | <= 1.4.2 Search vendor "Sun" for product "Jre" and version " <= 1.4.2" | update13 |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | * | - |
Safe
|
Sun Search vendor "Sun" | Jre Search vendor "Sun" for product "Jre" | <= 1.5.0 Search vendor "Sun" for product "Jre" and version " <= 1.5.0" | update11 |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | * | - |
Safe
|
Sun Search vendor "Sun" | Sdk Search vendor "Sun" for product "Sdk" | <= 1.4.2_13 Search vendor "Sun" for product "Sdk" and version " <= 1.4.2_13" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | * | - |
Safe
|