Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Checks version of Sun JRE
Detailed Explanation for this Vulnerability Assessment
The remote Windows host has a version of Sun's Java Runtime
Environment that is affected by a buffer overflow vulnerability.
According to its version number, the Sun JRE installed on the remote
host has a buffer overflow issue that can be triggered when parsing a
GIF image with the image width in an image block set to 0. If an
attacker can trick a user on the affected system into processing a
specially-crafted image file, say by visiting a malicious web site, he
may be able to leverage this flaw to execute arbitrary code on the
affected system subject to the user's rights.
See also :
Update to Sun Java 2 JDK and JRE 5.0 Update 10 / SDK and JRE 1.4.2_13
/ SDK and JRE 1.3.1_19 or later and remove if necessary any affected
Network Security Threat Level:
High / CVSS Base Score : 8.0
Networks Security ID: 22085
Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security
|HP PROLIANT MICROSERVER G8 E3-1220LV2 2.3GHZ 2 X 8GB 2 X 800GB SSD
|Suer Micro X8DAL Server 2x Xeon E5530 QC Hyperthreaded 2.4GHz 1GB ECC Ram&
|Acer Intel Xeon E3-1260L Quad-Core 2.40 GHz 4 GB Ram 2 TB HDD Micro Tower|AC100
|HP PROLIANT MICROSERVER G8 E3-1220LV2 2.3GHZ 16GB 3 X 1TB
No Discussions have been posted on this vulnerability.