Java Runtime Environment MixerSequence Function Pointer Control

2012-02-28T00:00:00
ID SAINT:549125407F190B4380D2EB77341FB1A4
Type saint
Reporter SAINT Corporation
Modified 2012-02-28T00:00:00

Description

Added: 02/28/2012
CVE: CVE-2010-0842
BID: 39077
OSVDB: 63493

Background

The Java Runtime Environment (JRE) is part of the Java Development Kit (JDK), a set of programming tools for developing Java applications. The Java Runtime Environment provides the minimum requirements for executing a Java application; it consists of the Java Virtual Machine (JVM), core classes, and supporting files.

Problem

When parsing Rich Music Format (RMF) files that contain Musical Instrument Digital Interface (MIDI) streams, part of the MIDI stream is used to set a function pointer in the JRE engine. If a specially crafted RMF file is referenced by an applet running under a vulnerable JRE, an attacker could cause this function pointer to divert execution to data controlled by the attacker, giving them control of execution on the target system.

Resolution

Apply Update 19 or later for JRE 6, or Update 24 or later for JRE 5.

References

<http://www.zerodayinitiative.com/advisories/ZDI-10-060/>
<http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html>

Limitations

This exploit has been tested against Oracle JRE 6 Update 18 on Windows XP SP3 English (DEP OptIn) and Windows 7 SP1 (DEP OptIn).

Platforms

Windows