New Search

Unspecified vulnerability in the ImageIO component in Oracle Java SE and Java for Business 6 Update 18 5.0 Update 23 and 1.4.2_25 allows remote attackers to affect confidentiality integrity and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is an integer overflow in the Java Runtime Environment that allows remote attackers to execute arbitrary code via a JPEG image that contains subsample dimensions with large values related to JPEGImageReader and "stepX".

oval:org.mitre.oval:def:14144

Unspecified vulnerability in the ImageIO component in Oracle Java SE and Java for Business 6 Update 18 5.0 Update 23 and 1.4.2_25 allows remote attackers to affect confidentiality integrity and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is an integer overflow in the Java Runtime Environment that allows remote attackers to execute arbitrary code via a JPEG image that contains subsample dimensions with large values related to JPEGImageReader and "stepX".

Family:
windows
Status:
ACCEPTED
Platform(s):
  • Microsoft Windows Server 2012
  • Microsoft Windows Server 2008
  • Microsoft Windows XP
  • Microsoft Windows Server 2003
  • Microsoft Windows 8
  • Microsoft Windows Server 2008 R2
  • Microsoft Windows 2000
  • Microsoft Windows Vista
  • Microsoft Windows 7
Class:
vulnerability
Reference(s):
  • CVE-2010-0841
Product(s):
  • Java Development Kit
  • Java Runtime Environment