4
CVSSv2

CVE-2007-5239

Published: 06/10/2007 Updated: 30/10/2018
CVSS v2 Base Score: 4 | Impact Score: 4.9 | Exploitability Score: 4.9
VMScore: 356
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:N

Vulnerability Summary

Java Web Start in Sun JDK and JRE 6 Update 2 and previous versions, JDK and JRE 5.0 Update 12 and previous versions, SDK and JRE 1.4.2_15 and previous versions, and SDK and JRE 1.3.1_20 and previous versions does not properly enforce access restrictions for untrusted (1) applications and (2) applets, which allows user-assisted remote malicious users to copy or rename arbitrary files when local users perform drag-and-drop operations from the untrusted application or applet window onto certain types of desktop applications.

Vulnerable Product Search on Vulmon Subscribe to Product

sun jdk 1.5.0

sun jdk 1.6.0

sun jre 1.3.0

sun jre 1.3.1

sun jre 1.4

sun jre 1.4.2_14

sun jre 1.4.2_15

sun jre 1.5.0

sun jre 1.4.2_1

sun jre 1.4.2_10

sun jre 1.4.2_9

sun sdk 1.3.1_01a

sun sdk 1.3.1_16

sun jre 1.6.0

sun sdk 1.4.2

sun sdk 1.4.2_03

sun sdk 1.4.2_14

sun sdk 1.4.2_15

sun sdk 1.3.1_18

sun sdk 1.4.2_10

sun sdk 1.4.2_11

sun jre 1.4.2_11

sun jre 1.4.2_12

sun jre 1.4.2_13

sun sdk 1.3.1_19

sun sdk 1.3.1_20

sun sdk 1.4.2_12

sun sdk 1.4.2_13

sun jre 1.4.1

sun jre 1.4.2

sun jre 1.4.2_3

sun jre 1.4.2_8

sun sdk 1.3.1_01

sun sdk 1.4.2_08

sun sdk 1.4.2_09

References

CWE-264http://sunsolve.sun.com/search/document.do?assetkey=1-26-103072-1http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0963.htmlhttp://www.redhat.com/support/errata/RHSA-2007-1041.htmlhttp://www.novell.com/linux/security/advisories/2007_55_java.htmlhttp://secunia.com/advisories/27206http://secunia.com/advisories/27261http://secunia.com/advisories/27716http://secunia.com/advisories/27693http://secunia.com/advisories/27804http://secunia.com/advisories/28777http://dev2dev.bea.com/pub/advisory/272http://www.redhat.com/support/errata/RHSA-2008-0132.htmlhttp://secunia.com/advisories/28880http://secunia.com/advisories/29042http://www.redhat.com/support/errata/RHSA-2008-0156.htmlhttp://securitytracker.com/id?1018814http://secunia.com/advisories/29214http://www.redhat.com/support/errata/RHSA-2008-0100.htmlhttp://secunia.com/advisories/29340http://www.gentoo.org/security/en/glsa/glsa-200804-20.xmlhttp://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.htmlhttp://secunia.com/advisories/29858http://security.gentoo.org/glsa/glsa-200804-28.xmlhttp://secunia.com/advisories/29897http://www.gentoo.org/security/en/glsa/glsa-200806-11.xmlhttp://secunia.com/advisories/30676http://www.vmware.com/security/advisories/VMSA-2008-0010.htmlhttp://secunia.com/advisories/30780http://www.vupen.com/english/advisories/2008/0609http://www.vupen.com/english/advisories/2008/1856/referenceshttp://www.vupen.com/english/advisories/2007/3895http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01234533https://exchange.xforce.ibmcloud.com/vulnerabilities/36950https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8758http://www.securityfocus.com/archive/1/482926/100/0/threadedhttps://nvd.nist.gov