CVE-2007-0243

MEDIUM

Description

Buffer overflow in Sun JDK and Java Runtime Environment (JRE) 5.0 Update 9 and earlier, SDK and JRE 1.4.2_12 and earlier, and SDK and JRE 1.3.1_18 and earlier allows applets to gain privileges via a GIF image with a block with a 0 width field, which triggers memory corruption.

References

http://dev2dev.bea.com/pub/advisory/242

http://docs.info.apple.com/article.html?artnum=307177

http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00876579

http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html

http://osvdb.org/32834

http://secunia.com/advisories/23757

http://secunia.com/advisories/24189

http://secunia.com/advisories/24202

http://secunia.com/advisories/24468

http://secunia.com/advisories/24993

http://secunia.com/advisories/25283

http://secunia.com/advisories/26049

http://secunia.com/advisories/26119

http://secunia.com/advisories/26645

http://secunia.com/advisories/27203

http://secunia.com/advisories/28115

http://security.gentoo.org/glsa/glsa-200702-08.xml

http://securityreason.com/securityalert/2158

http://securitytracker.com/id?1017520

http://sunsolve.sun.com/search/document.do?assetkey=1-26-102760-1

http://support.novell.com/techcenter/psdb/4f850d1e2b871db609de64ec70f0089c.html

http://support.novell.com/techcenter/psdb/d2f549cc040cd81ae4a268bb5edfe918.html

http://www.gentoo.org/security/en/glsa/glsa-200702-07.xml

http://www.kb.cert.org/vuls/id/388289

http://www.novell.com/linux/security/advisories/2007_45_java.html

http://www.redhat.com/support/errata/RHSA-2007-0166.html

http://www.redhat.com/support/errata/RHSA-2007-0167.html

http://www.redhat.com/support/errata/RHSA-2007-0956.html

http://www.redhat.com/support/errata/RHSA-2008-0261.html

http://www.securityfocus.com/archive/1/457159/100/0/threaded

http://www.securityfocus.com/archive/1/457638/100/0/threaded

http://www.securityfocus.com/bid/22085

http://www.us-cert.gov/cas/techalerts/TA07-022A.html

http://www.vupen.com/english/advisories/2007/0211

http://www.vupen.com/english/advisories/2007/0936

http://www.vupen.com/english/advisories/2007/1814

http://www.vupen.com/english/advisories/2007/4224

http://www.zerodayinitiative.com/advisories/ZDI-07-005.html

https://exchange.xforce.ibmcloud.com/vulnerabilities/31537

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11073

Details

Source: MITRE

Published: 2007-01-17

Updated: 2018-10-30

Type: CWE-119

Risk Information

CVSS v2.0

Base Score: 6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 8.6

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*

cpe:2.3:a:sun:jdk:*:update9:*:*:*:*:*:* versions up to 1.5.0 (inclusive)

cpe:2.3:a:sun:jre:1.3.1:update16:*:*:*:*:*:*

cpe:2.3:a:sun:jre:*:update18:*:*:*:*:*:* versions up to 1.3.1 (inclusive)

cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*

cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*

cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*

cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*

cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*

cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*

cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*

cpe:2.3:a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*

cpe:2.3:a:sun:sdk:1.4.2_08:*:*:*:*:*:*:*

cpe:2.3:a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*

cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*

cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*

Tenable Plugins

View all (15 total)

IDNameProductFamilySeverity
64819Sun Java JRE GIF Image Handling Buffer Overflow (102760) (Unix)NessusMisc.
medium
43837RHEL 3 / 4 : Satellite Server (RHSA-2008:0524)NessusRed Hat Local Security Checks
critical
43835RHEL 4 : Satellite Server (RHSA-2008:0261)NessusRed Hat Local Security Checks
critical
40708RHEL 4 / 5 : java-1.5.0-bea (RHSA-2007:0956)NessusRed Hat Local Security Checks
high
40703RHEL 4 / 5 : java-1.5.0-ibm (RHSA-2007:0167)NessusRed Hat Local Security Checks
medium
40702RHEL 3 / 4 / 5 : java-1.4.2-ibm (RHSA-2007:0166)NessusRed Hat Local Security Checks
medium
29474SuSE 10 Security Update : Java (ZYPP Patch Number 3891)NessusSuSE Local Security Checks
high
29472SuSE 10 Security Update : Java (ZYPP Patch Number 3844)NessusSuSE Local Security Checks
medium
29469SuSE 10 Security Update : IBM Java (ZYPP Patch Number 3851)NessusSuSE Local Security Checks
high
27280openSUSE 10 Security Update : java-1_5_0-sun (java-1_5_0-sun-3832)NessusSuSE Local Security Checks
medium
27276openSUSE 10 Security Update : java-1_4_2-sun (java-1_4_2-sun-3843)NessusSuSE Local Security Checks
medium
24369GLSA-200702-08 : AMD64 x86 emulation Sun's J2SE Development Kit: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
24368GLSA-200702-07 : Sun JDK/JRE: Execution of arbitrary codeNessusGentoo Local Security Checks
medium
24320RHEL 2.1 : IBMJava2 (RHSA-2007:0072)NessusRed Hat Local Security Checks
high
24022Sun Java JRE GIF Image Handling Buffer Overflow (102760)NessusWindows
high