6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.424 Medium
EPSS
Percentile
97.3%
A vulnerability in the Sun Java Runtime Environment may allow an attacker to execute arbitrary code on a vulnerable system.
The Sun Java Runtime Environment (JRE) allows users to run Java applications in a browser or as standalone programs. Sun has made the JRE available for multiple operating systems. When a GIF image with a specified width of 0 is processed, the Sun JRE will overwrite memory contents, which can cause pointer corruption.
Note that exploit code for this vulnerability is publicly available.
A remote unauthenticated attacker may be able to execute arbitrary code.
Apply an update
Per Sunsolve document 102760, this issue is addressed in
* `JDK and JRE 5.0 Update 10 or later`
* `SDK and JRE 1.4.2_13 or later`
* `SDK and JRE 1.3.1_19 or later`
Disable Java
Disable Java in your web browser, as specified in the Securing Your Web Browser document.
388289
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: January 17, 2007
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Please see Sunsolve document 102760.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23388289 Feedback>).
Notified: January 18, 2007 Updated: January 18, 2007
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Updated: February 13, 2007
Unknown
For information related to this and other published CERT Advisories that may relate to the IBM eServer Platforms (xSeries, iSeries, pSeries, and zSeries) please go to
In order to access this information you will require a Resource Link ID.
To subscribe to Resource Link go to
[
http://app-06.www.ibm.com/servers/resourcelink`](<http://app-06.www.ibm.com/servers/resourcelink>)`
and follow the steps for registration.
All questions should be referred to [email protected].`
The vendor has not provided us with any further information regarding this vulnerability.
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
Thanks to ZDI for reporting this vulnerability, who in turn credit an anonymous researcher.
This document was written by Will Dormann.
CVE IDs: | CVE-2007-0243 |
---|---|
Severity Metric: | 31.47 Date Public: |
secunia.com/advisories/23757/
secunia.com/advisories/24189/
secunia.com/advisories/24202/
secunia.com/advisories/24468/
secunia.com/advisories/25283/
securitytracker.com/alerts/2007/Jan/1017520.html
sunsolve.sun.com/search/document.do?assetkey=1-26-102760-1
www.securityfocus.com/bid/22085
www.zerodayinitiative.com/advisories/ZDI-07-005.html