Sun JDK/JRE: Execution of arbitrary code — GLSA 200702-07

Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) contain a memory corruption flaw that allows the applets to gain elevated privileges potentially leading to the execute of arbitrary code.

Affected Packages

dev-java/sun-jdk on all architectures
Affected versions < 1.5.0.10, < 1.4.2.13
Unaffected versions >= 1.5.0.10, revision >= 1.4.2.18, revision >= 1.4.2.17, revision >= 1.4.2.15, revision >= 1.4.2.14, revision >= 1.4.2.13
dev-java/sun-jre-bin on all architectures
Affected versions < 1.5.0.10, < 1.4.2.13
Unaffected versions >= 1.5.0.10, revision >= 1.4.2.18, revision >= 1.4.2.17, revision >= 1.4.2.15, revision >= 1.4.2.14, revision >= 1.4.2.13

Background

The Sun Java Development Kit (JDK) and the Sun Java Runtime Environment (JRE) provide the Sun Java platform.

Description

A anonymous researcher discovered that an error in the handling of a GIF image with a zero width field block leads to a memory corruption flaw.

Impact

An attacker could entice a user to run a specially crafted Java applet or application that would load a crafted GIF image, which could result in escalation of privileges and unauthorized access to system resources.

Workaround

There is no known workaround at this time.

Resolution

All Sun Java Development Kit 1.5 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-java/sun-jdk-1.5.0.10"

All Sun Java Development Kit 1.4 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose "=dev-java/sun-jdk-1.4.2*"

All Sun Java Runtime Environment 1.5 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-java/sun-jre-bin-1.5.0.10"

All Sun Java Runtime Environment 1.4 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose "=dev-java/sun-jre-bin-1.4.2*"

References

Release Date
February 17, 2007

Latest Revision
July 16, 2008: 05

Severity
normal

Exploitable
remote

Bugzilla entries