Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Checks version of Sun JRE
Detailed Explanation for this Vulnerability Assessment
The remote Windows host has a version of Sun's Java Runtime
Environment that is affected by a buffer overflow vulnerability.
According to its version number, the Sun JRE installed on the remote
host has a buffer overflow issue that can be triggered when parsing a
GIF image with the image width in an image block set to 0. If an
attacker can trick a user on the affected system into processing a
specially-crafted image file, say by visiting a malicious web site, he
may be able to leverage this flaw to execute arbitrary code on the
affected system subject to the user's rights.
See also :
Update to Sun Java 2 JDK and JRE 5.0 Update 10 / SDK and JRE 1.4.2_13
/ SDK and JRE 1.3.1_19 or later and remove if necessary any affected
Network Security Threat Level:
High / CVSS Base Score : 8.0
Networks Security ID: 22085
Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security
|Dell PowerEdge R620 8-Bay SFF 2x 4-Core E5-2609 2.4GHz 8GB H710 IDRAC 7 Express
|Intel Xeon SR21T | E5-2698BV3 | 2.0GHz CPU LGA 2011-V3 16-Core Processor
|Intel SR37T Xeon Platinum 8180M 28-Core 2.50GHz CPU Processor w/ Thermal Grease
No Discussions have been posted on this vulnerability.