Skip to main content

Sun Java JDK and JRE Code Execution and Security Bypass Vulnerabilities

Last Update Date: 28 Jan 2011 Release Date: 1 Apr 2010 5363 Views

RISK: Medium Risk

Multiple vulnerabilitieshave been identified in Sun Java JDK, JRE and SDK, which could be exploited by remote attackers to bypass security restrictions, gain knowledge of sensitive information, cause a denial of service or compromise a vulnerable system. These issues are caused by memory corruptions, buffer overflows, input validation and implementation errors within the ImageIO, Java 2D, JRE, Java Web Start, Java Plug-in, Pack200, Sound, JSSE, and HotSpot Server components, which could allow attackers to gain knowledge of or manipulate certain information, crash an affected application or execute arbitrary code by tricking a user into visiting a specially crafted web page.


Impact

  • Remote Code Execution
  • Information Disclosure

System / Technologies affected

  • Sun Java JDK version 6 Update 18 and prior
  • Sun Java JDK version 5.0 Update 23 and prior
  • Sun Java JRE version 6 Update 18 and prior
  • Sun Java JRE version 5.0 Update 23 and prior
  • Sun Java JRE version 1.4.2_25 and prior
  • Sun Java SDK version 1.4.2_25 and prior

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.


Vulnerability Identifier


Source


Related Link