First published: Wed Aug 23 2006(Updated: )
The Java Plug-in J2SE 1.3.0_02 through 5.0 Update 5, and Java Web Start 1.0 through 1.2 and J2SE 1.4.2 through 5.0 Update 5, allows remote attackers to exploit vulnerabilities by specifying a JRE version that contain vulnerabilities.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sun Java Web Start | =1.0 | |
Sun J2se | =5.0_update5 | |
Sun Java Web Start | =1.2 | |
Sun J2se | =5.0 | |
Sun Java Web Start | =1.0.1_02 | |
Sun J2se | =1.3.0_02 | |
Sun Java Web Start | =1.0.1 | |
Sun J2se | =5.0_update1 | |
Sun J2se | =1.4.2 | |
Sun Java Web Start | =1.0.1_01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4302 is classified as a high severity vulnerability due to the potential for remote exploitation.
The recommended fix for CVE-2006-4302 is to upgrade to a version of Java that is not affected by this vulnerability.
CVE-2006-4302 affects various versions of Java Plug-in J2SE from 1.3.0_02 through 5.0 Update 5 and Java Web Start from 1.0 through 1.2.
Exploitation of CVE-2006-4302 can allow attackers to execute arbitrary code on affected systems.
You can determine if your system is vulnerable to CVE-2006-4302 by checking the version of Java installed against the affected versions listed in the CVE description.