Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Checks version of Sun JRE
Detailed Explanation for this Vulnerability Assessment
The remote Windows host has a version of Sun's Java Runtime
Environment that is affected by a buffer overflow vulnerability.
According to its version number, the Sun JRE installed on the remote
host has a buffer overflow issue that can be triggered when parsing a
GIF image with the image width in an image block set to 0. If an
attacker can trick a user on the affected system into processing a
specially-crafted image file, say by visiting a malicious web site, he
may be able to leverage this flaw to execute arbitrary code on the
affected system subject to the user's rights.
See also :
Update to Sun Java 2 JDK and JRE 5.0 Update 10 / SDK and JRE 1.4.2_13
/ SDK and JRE 1.3.1_19 or later and remove if necessary any affected
Network Security Threat Level:
High / CVSS Base Score : 8.0
Networks Security ID: 22085
Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security
|IBM X3550 M2 2x Quad Core E5520 2.27GHz 16GB Rails ServeRAID 8K-L 25R8079 2x PSU
|Micron Server RAM 16GB 4x 4GB PC2-5300F FB DIMM Fully Buffered FITS Dell HP IBM
|Kingston Technology 16GB Chipkill IBM Server Memory 16 (PC2 5300) KTM2759K2/16G
|IBM 15R7170 MT36HTF25672M5Y-53EF1 2GB DDR2 533MHz CL4 ECC RDIMM Server Memory
No Discussions have been posted on this vulnerability.