Sun
Java Runtime Environment, which could be exploited by attackers to
bypass security restrictions and take complete control of an affected
system.
The first issue is due to integer overflow errors in the
"Java_sun_awt_image_ImagingLib_convolveBI()", "awt_parseRaster()", and
"awt_parseColorModel()" functions when handling large image dimensions,
which could be exploited by remote attackers to execute arbitrary
commands by tricking a user into visiting a malicious web site.
The second vulnerability is due to a stack overflow error in the
"Java_sun_awt_image_ImagingLib_lookupByteRaster()" function when
handling malformed arrays, which could be exploted by attackers to
compromise a vulnerable system via a malicious applet.
The third issue is due to an error in the
"Java_sun_font_SunLayoutEngine_nativeLayout()" function when handling
negative values, which could be exploited by attackers to cause a
denial of service or execute arbitrary commands by convincing a user to
visit a malicious Web page.
Affected Products
Sun Java JDK 1.5.x (for Windows, Solaris, and Linux)
Sun Java JRE 1.3.x (for Windows, Solaris, and Linux)
Sun Java JRE 1.4.x (for Windows, Solaris, and Linux)
Sun Java JRE 1.5.x / 5.x (for Windows, Solaris, and Linux)
Sun Java SDK 1.3.x (for Windows, Solaris, and Linux)
Sun Java SDK 1.4.x (for Windows, Solaris, and Linux)
Solution
Upgrade to JDK/JRE 5.0 Upgrade 8, SDK/JRE 1.4.2_13, or SDK/JRE 1.3.1_19 :
http://www.java.com