Chris Evans has reported some vulnerabilities in Sun JDK and JRE, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.
1) An integer overflow error exists within the parser for embedded ICC profiles of JPG and BMP images. This can be exploited to crash the JVM and potentially allow the execution of arbitrary code by e.g. tricking an application using the JDK or JRE to process a malicious image file.
2) The BMP file parser tries to open local files ("/dev/tty") while parsing BMP images. This can be exploited to cause a DoS by e.g. tricking an application using the JDK or JRE to process a malicious BMP image.
Successful exploitation of this vulnerability may require the JVM to be run on a Linux- or UNIX-like operating system.
Solution: Update to JDK and JRE 6 Update 1 or later, JDK and JRE 5.0 Update 11 or later, SDK and JRE 1.4.2_15 or later, and SDK and JRE 1.3.1_21 or later. See vendor advisory for further details.
Provided and/or discovered by: Chris Evans, Google
Original Advisory: Sun:
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: Sun JDK and JRE ICC and BMP Parser Vulnerabilities
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.