Stack-based buffer overflow in javaws.exe in Sun Java Web Start in JRE 5.0 Update 11 and earlier, and 6.0 Update 1 and earlier, allows remote attackers to execute arbitrary code via a long codebase attribute in a JNLP file.
http://docs.info.apple.com/article.html?artnum=307177
http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html
http://lists.grok.org.uk/pipermail/full-disclosure/2007-July/064552.html
http://research.eeye.com/html/advisories/published/AD20070705.html
http://secunia.com/advisories/25981
http://secunia.com/advisories/26314
http://secunia.com/advisories/26369
http://secunia.com/advisories/27266
http://secunia.com/advisories/28115
http://secunia.com/advisories/29858
http://secunia.com/advisories/30780
http://security.gentoo.org/glsa/glsa-200804-28.xml
http://securityreason.com/securityalert/2874
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102996-1
http://www.exploit-db.com/exploits/30284
http://www.gentoo.org/security/en/glsa/glsa-200804-20.xml
http://www.gentoo.org/security/en/glsa/glsa-200806-11.xml
http://www.novell.com/linux/security/advisories/2007_56_ibmjava.html
http://www.redhat.com/support/errata/RHSA-2007-0818.html
http://www.redhat.com/support/errata/RHSA-2007-0829.html
http://www.securityfocus.com/archive/1/473224/100/0/threaded
http://www.securityfocus.com/archive/1/473356/100/0/threaded
http://www.securityfocus.com/bid/24832
http://www.securitytracker.com/id?1018346
http://www.vupen.com/english/advisories/2007/2477
http://www.vupen.com/english/advisories/2007/4224
https://exchange.xforce.ibmcloud.com/vulnerabilities/35320
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11367
OR
cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*
ID | Name | Product | Family | Severity |
---|---|---|---|---|
64834 | Sun Java Web Start JNLP File Handling Overflow (102996) (Unix) | Nessus | Misc. | medium |
63843 | RHEL 4 : java-1.5.0-sun (RHSA-2007:0818) | Nessus | Red Hat Local Security Checks | high |
60344 | Scientific Linux Security Update : jdk (java) on SL3.x, SL4.x i386/x86_64 | Nessus | Scientific Linux Local Security Checks | high |
60316 | Scientific Linux Security Update : jdk (java) on SL5.x i386/x86_64 | Nessus | Scientific Linux Local Security Checks | high |
40706 | RHEL 4 / 5 : java-1.5.0-ibm (RHSA-2007:0829) | Nessus | Red Hat Local Security Checks | critical |
32013 | GLSA-200804-20 : Sun JDK/JRE: Multiple vulnerabilities | Nessus | Gentoo Local Security Checks | critical |
29702 | Mac OS X : Java for Mac OS X 10.4 Release 6 | Nessus | MacOS X Local Security Checks | critical |
29475 | SuSE 10 Security Update : IBM Java 1.5.0 (ZYPP Patch Number 4544) | Nessus | SuSE Local Security Checks | medium |
29470 | SuSE 10 Security Update : IBM Java 1.4.2 (ZYPP Patch Number 4542) | Nessus | SuSE Local Security Checks | medium |
25693 | Sun Java Web Start JNLP File Handling Overflow (102996) | Nessus | Windows | medium |