Back to search

VMSA-2010-0002.4: WebAccess Context Data Cross-site Scripting Vulnerability (CVE-2009-3866)

Severity CVSS Published Added Modified
9 (AV:N/AC:M/Au:N/C:C/I:C/A:C) November 05, 2009 September 02, 2010 December 17, 2012

Available Exploits 

Description

The Java Web Start Installer in Sun Java SE in JDK and JRE 6 before Update 17 does not properly use security model permissions when removing installer extensions, which allows remote attackers to execute arbitrary code by modifying a certain JNLP file to have a URL field that points to an unintended trusted application, aka Bug Id 6872824.

Free Nexpose Download

Discover, prioritize, and remediate security risks today!

 Download now

References

Solution

  • VMware VMware ESX Server 3.5

    Upgrade VMware ESX 3.5 to build number 227413

    Download and apply the upgrade from: http://www.vmware.com/patchmgr/findPatchByReleaseName.portal

    The typical way to apply patches to VMware ESX 3.5 hosts is via the vCenter Update Manager. For details, see the vCenter Update Manager Administration Guide.

    To update ESX/ESXi hosts without using Update Manager, obtain the patch for this vulnerability by searching for the build number in the link below

  • VMware VMware ESX Server 4.0

    Upgrade VMware ESX 4.0 to build number 256968

    Download and apply the upgrade from: http://www.vmware.com/patchmgr/findPatchByReleaseName.portal

    The typical way to apply patches to VMware ESX 4.0 hosts is via the vCenter Update Manager. For details, see the vCenter Update Manager Administration Guide.

    To update ESX/ESXi hosts without using Update Manager, obtain the patch for this vulnerability by searching for the build number in the link below

Related Vulnerabilities