Lucene search

K
certCERTVU:388289
HistoryJan 17, 2007 - 12:00 a.m.

Sun Microsystems Java GIF image processing buffer overflow

2007-01-1700:00:00
www.kb.cert.org
22

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.424 Medium

EPSS

Percentile

97.3%

Overview

A vulnerability in the Sun Java Runtime Environment may allow an attacker to execute arbitrary code on a vulnerable system.

Description

The Sun Java Runtime Environment (JRE) allows users to run Java applications in a browser or as standalone programs. Sun has made the JRE available for multiple operating systems. When a GIF image with a specified width of 0 is processed, the Sun JRE will overwrite memory contents, which can cause pointer corruption.

Note that exploit code for this vulnerability is publicly available.


Impact

A remote unauthenticated attacker may be able to execute arbitrary code.


Solution

Apply an update
Per Sunsolve document 102760, this issue is addressed in

* `JDK and JRE 5.0 Update 10 or later`
* `SDK and JRE 1.4.2_13 or later`
* `SDK and JRE 1.3.1_19 or later`  

Disable Java
Disable Java in your web browser, as specified in the Securing Your Web Browser document.


Vendor Information

388289

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Sun Microsystems, Inc. __ Affected

Updated: January 17, 2007

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see Sunsolve document 102760.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23388289 Feedback>).

Apple Computer, Inc. Unknown

Notified: January 18, 2007 Updated: January 18, 2007

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

IBM eServer __ Unknown

Updated: February 13, 2007

Status

Unknown

Vendor Statement

For information related to this and other published CERT Advisories that may relate to the IBM eServer Platforms (xSeries, iSeries, pSeries, and zSeries) please go to

https://app-06.www.ibm.com/servers/resourcelink/lib03020.nsf/pages/securityalerts?OpenDocument&pathID=`

In order to access this information you will require a Resource Link ID.
To subscribe to Resource Link go to
[http://app-06.www.ibm.com/servers/resourcelink`](<http://app-06.www.ibm.com/servers/resourcelink&gt;)`
and follow the steps for registration.

All questions should be referred to [email protected].`

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to ZDI for reporting this vulnerability, who in turn credit an anonymous researcher.

This document was written by Will Dormann.

Other Information

CVE IDs: CVE-2007-0243
Severity Metric: 31.47 Date Public:

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.424 Medium

EPSS

Percentile

97.3%