Added: 02/28/2012
CVE: CVE-2010-0842
BID: 39077
OSVDB: 63493
The Java Runtime Environment (JRE) is part of the Java Development Kit (JDK), a set of programming tools for developing Java applications. The Java Runtime Environment provides the minimum requirements for executing a Java application; it consists of the Java Virtual Machine (JVM), core classes, and supporting files.
When parsing Rich Music Format (RMF) files that contain Musical Instrument Digital Interface (MIDI) streams, part of the MIDI stream is used to set a function pointer in the JRE engine. If a specially crafted RMF file is referenced by an applet running under a vulnerable JRE, an attacker could cause this function pointer to divert execution to data controlled by the attacker, giving them control of execution on the target system.
Apply Update 19 or later for JRE 6, or Update 24 or later for JRE 5.
<http://www.zerodayinitiative.com/advisories/ZDI-10-060/>
<http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html>
This exploit has been tested against Oracle JRE 6 Update 18 on Windows XP SP3 English (DEP OptIn) and Windows 7 SP1 (DEP OptIn).
Windows