Languages

Archived - About the security content of Java 1.3.1 and 1.4.2 Release 2

This article has been archived and is no longer updated by Apple.

This document describes the security content of Java version 1.3.1_16, and Java 1.4.2 Release 2, which can be downloaded and installed using Software Update preferences, or from Apple Downloads.

For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.

For information about the Apple Product Security PGP Key, see "How To Use The Apple Product Security PGP Key."

Where possible, CVE IDs are used to reference the vulnerabilities for further information.

To learn about other Security Updates, see "Apple Security Updates."

Java 1.3.1 and 1.4.2 Release 2

  • Java

    Available for: Java 1.4.2

    Impact: Java is updated to version 1.4.2_09

    Description: This release updates Java to version 1.4.2_09 to address a number of issues. Further information is available in the 1.4.2_09 section of Sun's release notes at http://java.sun.com/j2se/1.4.2/ReleaseNotes.html. Credit to Sun and Marc Schoenefeld for notifying us about these issues.

  • Java

    Available for: Java 1.3.1

    Impact: Java is updated to version 1.3.1_16

    Description: This release updates Java to version 1.3.1_16 to address a number of issues. Further information is available in the 1.3.1_16 section of Sun's release notes at http://java.sun.com/j2se/1.3/ReleaseNotes.html.

  • Java

    CVE-ID: CAN-2005-2527

    Available for: Java 1.4.2

    Impact: A file race condition can lead to file corruption or the creation of arbitrary files.

    Description: This is specific to the implementation of Java on Mac OS X. Under certain conditions, Java may insecurely handle a temporary directory. Subsequent file operations inside that directory could be exposed to file race conditions. This update addresses the issue by adding validation when operating in the temporary directory.

  • Java

    CVE-ID: CAN-2005-2528

    Available for: Java 1.3.1, Java 1.4.2

    Impact: Insecure temporary file handling can lead to file corruption or the creation of arbitrary files.

    Description: This is specific to the implementation of Java on Mac OS X. The privileged helper used to update Java shared archives insecurely creates temporary files, which can lead to a file race condition. This update addresses the issue by avoiding file operations in user-accessible locations. This issue does not affect systems prior to Mac OS X v10.4. Credit to kf_lists[at]digitalmunition[dot]com for reporting this issue.

  • Java

    CVE-ID: CAN-2005-2529

    Available for: Java 1.4.2

    Impact: Malicious system users can gain elevated privileges.

    Description: This is specific to the implementation of Java on Mac OS X. The utility used to update Java shared archives is susceptible to a privilege escalation vulnerability from local system users. This update addresses the issue by performing additional clean-up before launching the utility on behalf of unprivileged users. This issue does not affect systems prior to Mac OS X v10.4. Credit to Dino Dai Zovi for reporting this issue.

Last Modified: Feb 19, 2012
  • Last Modified: Feb 19, 2012
  • Article: TA23502
  • Views:

    1931

Additional Product Support Information