Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) contain a memory corruption flaw that allows the applets to gain elevated privileges potentially leading to the execute of arbitrary code.
Package | dev-java/sun-jdk on all architectures |
---|---|
Affected versions | < 1.5.0.10 < 1.4.2.13 |
Unaffected versions | >= 1.5.0.10 revision >= 1.4.2.18 revision >= 1.4.2.17 revision >= 1.4.2.15 revision >= 1.4.2.14 revision >= 1.4.2.13 |
Package | dev-java/sun-jre-bin on all architectures |
---|---|
Affected versions | < 1.5.0.10 < 1.4.2.13 |
Unaffected versions | >= 1.5.0.10 revision >= 1.4.2.18 revision >= 1.4.2.17 revision >= 1.4.2.15 revision >= 1.4.2.14 revision >= 1.4.2.13 |
The Sun Java Development Kit (JDK) and the Sun Java Runtime Environment (JRE) provide the Sun Java platform.
A anonymous researcher discovered that an error in the handling of a GIF image with a zero width field block leads to a memory corruption flaw.
An attacker could entice a user to run a specially crafted Java applet or application that would load a crafted GIF image, which could result in escalation of privileges and unauthorized access to system resources.
There is no known workaround at this time.
All Sun Java Development Kit 1.5 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-java/sun-jdk-1.5.0.10"
All Sun Java Development Kit 1.4 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose "=dev-java/sun-jdk-1.4.2*"
All Sun Java Runtime Environment 1.5 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-java/sun-jre-bin-1.5.0.10"
All Sun Java Runtime Environment 1.4 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose "=dev-java/sun-jre-bin-1.4.2*"
Release date
February 17, 2007
Latest revision
July 16, 2008: 05
Severity
normal
Exploitable
remote
Bugzilla entries