Gentoo Forums
Gentoo Forums
Gentoo Forums
Quick Search: in
[ GLSA 200702-07 ] Sun JDK/JRE: Execution of arbitrary code
View unanswered posts
View posts from last 24 hours

 
Reply to topic    Gentoo Forums Forum Index News & Announcements
View previous topic :: View next topic  
Author Message
GLSA
Advocate
Advocate


Joined: 12 May 2004
Posts: 2663

PostPosted: Sat Feb 17, 2007 11:26 pm    Post subject: [ GLSA 200702-07 ] Sun JDK/JRE: Execution of arbitrary code Reply with quote

Gentoo Linux Security Advisory

Title: Sun JDK/JRE: Execution of arbitrary code (GLSA 200702-07)
Severity: normal
Exploitable: remote
Date: February 17, 2007
Updated: July 16, 2008
Bug(s): #162511
ID: 200702-07

Synopsis

Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) contain a memory corruption flaw that allows the applets to gain elevated privileges potentially leading to the execute of arbitrary code.

Background

The Sun Java Development Kit (JDK) and the Sun Java Runtime Environment (JRE) provide the Sun Java platform.

Affected Packages

Package: dev-java/sun-jdk
Vulnerable: < 1.5.0.10
Vulnerable: < 1.4.2.13
Unaffected: >= 1.5.0.10
Unaffected: >= 1.4.2.18 < 1.4.2.19
Unaffected: >= 1.4.2.17 < 1.4.2.18
Unaffected: >= 1.4.2.15 < 1.4.2.16
Unaffected: >= 1.4.2.14 < 1.4.2.15
Unaffected: >= 1.4.2.13 < 1.4.2.14
Architectures: All supported architectures

Package: dev-java/sun-jre-bin
Vulnerable: < 1.5.0.10
Vulnerable: < 1.4.2.13
Unaffected: >= 1.5.0.10
Unaffected: >= 1.4.2.18 < 1.4.2.19
Unaffected: >= 1.4.2.17 < 1.4.2.18
Unaffected: >= 1.4.2.15 < 1.4.2.16
Unaffected: >= 1.4.2.14 < 1.4.2.15
Unaffected: >= 1.4.2.13 < 1.4.2.14
Architectures: All supported architectures


Description

A anonymous researcher discovered that an error in the handling of a GIF image with a zero width field block leads to a memory corruption flaw.

Impact

An attacker could entice a user to run a specially crafted Java applet or application that would load a crafted GIF image, which could result in escalation of privileges and unauthorized access to system resources.

Workaround

There is no known workaround at this time.

Resolution

All Sun Java Development Kit 1.5 users should upgrade to the latest version:
Code:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-java/sun-jdk-1.5.0.10"
All Sun Java Development Kit 1.4 users should upgrade to the latest version:
Code:
# emerge --sync
# emerge --ask --oneshot --verbose "=dev-java/sun-jdk-1.4.2*"
All Sun Java Runtime Environment 1.5 users should upgrade to the latest version:
Code:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-java/sun-jre-bin-1.5.0.10"
All Sun Java Runtime Environment 1.4 users should upgrade to the latest version:
Code:
# emerge --sync
# emerge --ask --oneshot --verbose "=dev-java/sun-jre-bin-1.4.2*"


References

CVE-2007-0243


Last edited by GLSA on Thu Jul 17, 2008 4:18 am; edited 4 times in total
Back to top
View user's profile Send private message
Display posts from previous:   
Reply to topic    Gentoo Forums Forum Index News & Announcements All times are GMT
Page 1 of 1

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum