Sun Java Runtime Environment Multiple Remote Integer and Buffer Overflow Vulnerabilities
Sun Java Runtime Environment, which could be exploited by attackers to bypass security restrictions and take complete control of an affected system.

The first issue is due to integer overflow errors in the "Java_sun_awt_image_ImagingLib_convolveBI()", "awt_parseRaster()", and "awt_parseColorModel()" functions when handling large image dimensions, which could be exploited by remote attackers to execute arbitrary commands by tricking a user into visiting a malicious web site.

The second vulnerability is due to a stack overflow error in the "Java_sun_awt_image_ImagingLib_lookupByteRaster()" function when handling malformed arrays, which could be exploted by attackers to compromise a vulnerable system via a malicious applet.

The third issue is due to an error in the "Java_sun_font_SunLayoutEngine_nativeLayout()" function when handling negative values, which could be exploited by attackers to cause a denial of service or execute arbitrary commands by convincing a user to visit a malicious Web page.

Affected Products

Sun Java JDK 1.5.x (for Windows, Solaris, and Linux)
Sun Java JRE 1.3.x (for Windows, Solaris, and Linux)
Sun Java JRE 1.4.x (for Windows, Solaris, and Linux)
Sun Java JRE 1.5.x / 5.x (for Windows, Solaris, and Linux)
Sun Java SDK 1.3.x (for Windows, Solaris, and Linux)
Sun Java SDK 1.4.x (for Windows, Solaris, and Linux)

Solution

Upgrade to JDK/JRE 5.0 Upgrade 8, SDK/JRE 1.4.2_13, or SDK/JRE 1.3.1_19 :
http://www.java.com
더보기

댓글,