RULE(RULE ID:333101)

Rule General Information
Release Date: 2021-03-26
Rule Name: Sun Java Web Start JNLP File Argument Injection Vulnerability (CVE-2004-1029)
Severity:
CVE ID:
Rule Protection Details
Description: A vulnerability has been reported in the way Sun Java Web Start isolates java applications from the host system. A Java Web Start configuration file (JNLP) can be crafted to inject command-line arguments into the vulnerable Web Start virtual machine application. An attacker can exploit this vulnerability to bypass security restrictions and perform privileged operations on a target system. In the case of a successful attack, the target system will not exhibit any specific unusual behaviour. The Java security restrictions will be bypassed leaving the system open to arbitrary code execution by the JNLP Java application. The behaviour of the attack target will depend entirely on the nature of the application. A successful exploitation may result in the target filesystem being compromised, in order to facilitate further exploitation.
Impact: An attacker could exploit this vulnerability to have unspecified effect.
Affected OS: Windows, Linux, Others
Reference: SecurityFocusBID:12317
http://jouko.iki.fi/adv/javaplugin.html
http://lists.apple.com/archives/security-announce/2005/Feb/msg00000.html
http://rpmfind.net/linux/RPM/suse/updates/9.3/i386/rpm/i586/java-1_4_2-sun-src-1.4.2.08-0.1.i586.html
Solutions
Refer to the announcement or patch by the vendor: http://java.sun.com/j2se/1.4.2/download.html