Dear all,

In our project, we are using Tomcat 5.5.26 and as it is reported that some
vulnerabilities have been found. So, I just want to test our system if these
vulnerabilties are exploited in our side or not. But I do not know how to
test? Is there someone else who could help me in testing (how to generate)
any of the following cases below? If at least one of them can be tested and
resulted failure, that means Tomcat will be upgraded.

Any help will be appreciated.
Thanks.

1) An error in the Java Runtime Environment Virtual Machine can be exploited
by a malicious, untrusted applet to read and write local files and execute
local applications.

2) An error in the Java Management Extensions (JMX) management agent can be
exploited by a JMX client to perform certain unauthorized operations on a
system running JMX with local monitoring enabled.

3) Two errors within the scripting language support in the Java Runtime
Environment can be exploited by malicious, untrusted applets to access
information from another applet, read and write local files, and execute
local applications.

4) Boundary errors in Java Web Start can be exploited by an untrusted Java
Web Start applications to cause buffer overflows.

5) Three errors in Java Web Start can be exploited by an untrusted Java Web
Start applications to create or delete arbitrary files with the privileges
of the user running the untrusted Java Web Start application, or to
determine the location of the Java Web Start cache.

6) An error in the implementation of Secure Static Versioning allows applets
to run on an older release of JRE.

7) Errors in the Java Runtime Environment can be exploited by an untrusted
applet to bypass the same origin policy and establish socket connections to
certain services running on the local host.

8) An error in the Java Runtime Environment when processing certain XML data
can be exploited to allow unauthorized access to certain URL resources or
cause a DoS.
Successful exploitation requires the JAX-WS client or service in a trusted
application to process the malicious XML data.

9) An error in the Java Runtime Environment when processing certain XML data
can be exploited by an untrusted applet or application to gain unauthorized
access to certain URL resources.

10) A boundary error when processing fonts in the Java Runtime Environment
can be exploited to cause a buffer overflow.

Reply via email to