Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Checks version of Sun JRE
Detailed Explanation for this Vulnerability Assessment
The remote Windows host has a version of Sun's Java Runtime
Environment that is affected by a buffer overflow vulnerability.
According to its version number, the Sun JRE installed on the remote
host has a buffer overflow issue that can be triggered when parsing a
GIF image with the image width in an image block set to 0. If an
attacker can trick a user on the affected system into processing a
specially-crafted image file, say by visiting a malicious web site, he
may be able to leverage this flaw to execute arbitrary code on the
affected system subject to the user's rights.
See also :
Update to Sun Java 2 JDK and JRE 5.0 Update 10 / SDK and JRE 1.4.2_13
/ SDK and JRE 1.3.1_19 or later and remove if necessary any affected
Network Security Threat Level:
High / CVSS Base Score : 8.0
Networks Security ID: 22085
Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security
|Atari 1050 5.25" Floppy Disk Drive + Atari 850 interface module
|Vintage Atari 1050 5.25" Floppy Disk Drive, Untested, As-Is Powers Up
|Atari 130xe untested
|Atari 800 Omnimon and 16k and 32k RAMCRAM expansion boards lot
No Discussions have been posted on this vulnerability.