vendor:
Mac OS X
by:
Landon Fuller
7,5
CVSS
HIGH
Escape from Java sandbox
20
CWE
Product Name: Mac OS X
Affected Version From: PowerPC and Intel Mac OS X systems
Affected Version To: PowerPC and Intel Mac OS X systems
Patch Exists: YES
Related CWE: CVE-2008-5353
CPE: o:apple:mac_os_x
Metasploit:
https://www.rapid7.com/db/vulnerabilities/apple-java-cve-2008-5353/, https://www.rapid7.com/db/vulnerabilities/vmsa-2009-0014-cve-2008-5353/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2008-5353/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2009-0445/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2009-0466/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2008-5353/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: PowerPC and Intel Mac OS X systems
2008
Critical Mac OS X Java Vulnerabilities
CVE-2008-5353 allows malicious code to escape the Java sandbox and run arbitrary commands with the permissions of the executing user. This may result in untrusted Java applets executing arbitrary code merely by visiting a web page hosting the applet.
Mitigation:
Mac OS X users should disable Java applets in their browsers and disable 'Open "safe" files after downloading' in Safari. Soylatte users running untrusted code should upgrade to an OpenJDK6-based release, where possible.