=====================================================================
                                   CERT-Renater

                        Note d'Information No. 2007/VULN277
_____________________________________________________________________

DATE                      : 03/07/2007

HARDWARE PLATFORM(S)      : /

OPERATING SYSTEM(S)       : Systems running JavaDoc Tool.

======================================================================

Sun(sm) Alert Notification
     * Sun Alert ID: 102958
     * Synopsis: Cross-site Scripting Vulnerability (XSS) Affecting Pages
       Generated with JavaDoc Tool
     * Category: Security
     * Product: Java 2 Platform, Standard Edition
     * BugIDs: 6490790
     * Avoidance: Upgrade
     * State: Resolved
     * Date Released: 28-Jun-2007
     * Date Closed: 28-Jun-2007
     * Date Modified:

1. Impact

   A defect in the Javadoc tool in various releases of the JDK may lead
   to the generation of HTML documentation pages which contain a
   potential cross-site scripting (XSS) vulnerability. This may allow a
   remote user to gain access to cookies from the website that hosts the
   generated documentation.

   Sun acknowledges, with thanks, Martin Straka, for bringing this issue
   to our attention.

2. Contributing Factors

   This issue can occur in the following releases for all platforms
   (Solaris, Linux, and Windows):
     * JDK 6
     * JDK 5.0 Update 11 and earlier

   Note: The Javadoc tool included in SDK 1.4.x and earlier is not
   affected by this issue.

   To determine the version of Java on a system, the following command
   can be run:
    % java -version
    java version "1.5.0_02-b09"

   For this vulnerability to be exploited, a user must click a link
   (created by a malicious user) in a website or email that points to a
   vulnerable "index.html" documentation page. The user's cookies from
   the website that hosts the "index.html" documentation page may then be
   accessed by the malicious user.

3. Symptoms

   There are no predictable symptoms that would indicate the described
   issue has been exploited.

4. Relief/Workaround

   Please see the "Note" in the Resolution section below.

5. Resolution

   This issue is addressed in the following releases for all platforms
   (Solaris, Linux, and Windows):
     * JDK 6 Update 1 or later
     * JDK 5.0 Update 12 or later

   JDK 6 is available for download at the following link:

   http://java.sun.com/javase/downloads/index.jsp

   JDK 5.0 is available for download at the following link:

   http://java.sun.com/javase/downloads/index_jdk5.jsp

   Note: In order to fully resolve this issue, any "index.html" page that
   was generated with an affected version of the Javadoc tool must be
   regenerated using a Javadoc tool in one of the releases mentioned in
   this resolution section.

   This Sun Alert notification is being provided to you on an "AS IS"
   basis. This Sun Alert notification may contain information provided by
   third parties. The issues described in this Sun Alert notification may
   or may not impact your system(s). Sun makes no representations,
   warranties, or guarantees as to the information contained herein. ANY
   AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION
   WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR
   NON-INFRINGEMENT, ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT
   YOU ACKNOWLEDGE THAT SUN SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT,
   INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE
   OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN.
   This Sun Alert notification contains Sun proprietary and confidential
   information. It is being provided to you pursuant to the provisions of
   your agreement to purchase services from Sun, or, if you do not have
   such an agreement, the Sun.com Terms of Use. This Sun Alert
   notification may only be used for the purposes contemplated by these
   agreements.

   Copyright 2000-2006 Sun Microsystems, Inc., 4150 Network Circle, Santa
   Clara, CA 95054 U.S.A. All rights reserved

======================================================================

          =========================================================
          Les serveurs de référence du CERT-Renater
          http://www.urec.fr/securite
          http://www.cru.fr/securite
          http://www.renater.fr
          =========================================================
          + CERT-RENATER          | tel : 01-53-94-20-44          +
          + 151 bd de l'Hopital   | fax : 01-53-94-20-41          +
          + 75013 Paris           | email: certsvp@renater.fr     +
          =========================================================






