Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Checks version of Sun JRE
Detailed Explanation for this Vulnerability Assessment
The remote Windows host has a version of Sun's Java Runtime
Environment that is affected by a buffer overflow vulnerability.
According to its version number, the Sun JRE installed on the remote
host has a buffer overflow issue that can be triggered when parsing a
GIF image with the image width in an image block set to 0. If an
attacker can trick a user on the affected system into processing a
specially-crafted image file, say by visiting a malicious web site, he
may be able to leverage this flaw to execute arbitrary code on the
affected system subject to the user's rights.
See also :
Update to Sun Java 2 JDK and JRE 5.0 Update 10 / SDK and JRE 1.4.2_13
/ SDK and JRE 1.3.1_19 or later and remove if necessary any affected
Network Security Threat Level:
High / CVSS Base Score : 8.0
Networks Security ID: 22085
Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security
|Patriot Viper Elite 8GB (2 x 4GB) DIMM PC4-19200 (DDR4-2400) Memory...
| G.SKILL Ripjaws 4GB DDR4 2400 PC4-19200 260-Pin SO-DIMM F4-2400C16D-8GRS
|Crucial 4GB 2x2GB PC2-5300 DDR2 Low Profile Desktop Memory CT25664AA667.M16VFE
No Discussions have been posted on this vulnerability.