CVE-2007-2435

Summary

CVECVE-2007-2435
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2007-05-02 10:19:00 UTC
Updated2017-10-11 01:32:00 UTC
DescriptionSun Java Web Start in JDK and JRE 5.0 Update 10 and earlier, and Java Web Start in SDK and JRE 1.4.2_13 and earlier, allows remote attackers to perform unauthorized actions via an application that grants privileges to itself, related to "Incorrect Use of System Classes" and probably related to support for JNLP files.

Risk And Classification

Problem Types: CWE-264

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Sun Java Enterprise System All update10 All All
Application Sun Jre All update13 All All
Application Sun Jre All update10 All All
Application Sun Sdk All All All All

References

ReferenceSourceLinkTags
Sun Java Web Start Unauthorized Access Vulnerability BID www.securityfocus.com Patch
IBM JDK/JRE: Multiple vulnerabilities — Gentoo Linux Documentation GENTOO www.gentoo.org
Webmail : Solution de messagerie professionnelle - OVHcloud- OVH VUPEN www.vupen.com
Red Hat update for java-1.4.2-ibm - Secunia Advisories - Vulnerability Intelligence - Secunia.com SECUNIA secunia.com
Webmail : Solution de messagerie professionnelle - OVHcloud- OVH VUPEN www.vupen.com
BEA JRockit Multiple Vulnerabilities - Advisories - Secunia SECUNIA secunia.com
rhn.redhat.com | Red Hat Support REDHAT www.redhat.com
ASA-2007-199 (SUN 102881) CONFIRM support.avaya.com
SecurityTracker.com Archives - Java Web Start Incorrect Use of System Classes Lets Users Gain Elevated Privileges SECTRACK www.securitytracker.com
#201744: Security Vulnerability With Java Web Start Related to Incorrect Use of System Classes SUNALERT sunsolve.sun.com Patch, Vendor Advisory
Webmail - OVH VUPEN www.vupen.com
Avaya IR Java Web Start Insecure System Classes Vulnerability - Advisories - Secunia SECUNIA secunia.com
APPLE-SA-2007-12-14 Java Release 6 for Mac OS X 10.4 APPLE lists.apple.com
Gentoo updates for sun-jdk and sun-jre-bin - Secunia Advisories - Vulnerability Intelligence - Secunia.com SECUNIA secunia.com
IBM X-Force Exchange XF exchange.xforce.ibmcloud.com
35483 OSVDB osvdb.org
Gentoo update for ibm-jdk-bin and ibm-jre-bin - Secunia Advisories - Vulnerability Intelligence - Secunia.com SECUNIA secunia.com
Sun JDK/JRE: Multiple vulnerabilities — Gentoo Linux Documentation GENTOO www.gentoo.org
Gentoo update for sun-jdk, sun-jre-bin, and emul-linux-x86-java - Secunia Advisories - Vulnerability Intelligence - Secunia.com SECUNIA secunia.com
Red Hat update for java-1.5.0-ibm - Secunia Advisories - Vulnerability Information - Secunia.com SECUNIA secunia.com
Gentoo Linux Documentation -- Sun JDK/JRE: Multiple vulnerabilities GENTOO www.gentoo.org
Repository / Oval Repository OVAL oval.cisecurity.org
Gentoo Linux Documentation -- emul-linux-x86-java: Multiple vulnerabilities GENTOO security.gentoo.org
rhn.redhat.com | Red Hat Support REDHAT www.redhat.com
Mac OS X Java Multiple Vulnerabilities - Advisories - Secunia SECUNIA secunia.com
Java 2 Platform Privilege Escalation Vulnerability - Advisories - Secunia SECUNIA secunia.com Patch, Vendor Advisory
An Application started through Java Web Start may be able to elevate its privileges BEA dev2dev.bea.com
Gentoo update for emul-linux-x86-java - Secunia Advisories - Vulnerability Intelligence - Secunia.com SECUNIA secunia.com
About the security content of Java Release 6 for Mac OS X 10.4 MISC docs.info.apple.com
JRockit: Multiple vulnerabilities — Gentoo Linux Documentation GENTOO security.gentoo.org
rhn.redhat.com | Red Hat Support REDHAT www.redhat.com
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report