New Search

Unspecified vulnerability in the Java 2D component in Oracle Java SE and Java for Business 6 Update 18 5.0 Update 23 1.4.2_25 and 1.3.1_27 allows remote attackers to affect confidentiality integrity and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is a heap-based buffer overflow that allows arbitrary code execution via a crafted image.

oval:org.mitre.oval:def:10392

Unspecified vulnerability in the Java 2D component in Oracle Java SE and Java for Business 6 Update 18 5.0 Update 23 1.4.2_25 and 1.3.1_27 allows remote attackers to affect confidentiality integrity and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is a heap-based buffer overflow that allows arbitrary code execution via a crafted image.

Family:
unix
Status:
ACCEPTED
Platform(s):
  • Red Hat Enterprise Linux 5
  • Oracle Linux 5
  • CentOS Linux 5
Class:
vulnerability
Reference(s):
  • CVE-2010-0847
Product(s):