Definition
New Search
Unspecified vulnerability in the ImageIO component in Oracle Java SE and Java for Business 6 Update 18 5.0 Update 23 1.4.2_25 and 1.3.1_27 allows remote attackers to affect confidentiality integrity and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is a heap-based buffer overflow that allows remote attackers to execute arbitrary code related to an "invalid assignment" and inconsistent length values in a JPEG image encoder (JPEGImageEncoderImpl).
oval:org.mitre.oval:def:14503
Unspecified vulnerability in the ImageIO component in Oracle Java SE and Java for Business 6 Update 18 5.0 Update 23 1.4.2_25 and 1.3.1_27 allows remote attackers to affect confidentiality integrity and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is a heap-based buffer overflow that allows remote attackers to execute arbitrary code related to an "invalid assignment" and inconsistent length values in a JPEG image encoder (JPEGImageEncoderImpl).
Family:
windows
Status:
ACCEPTED
Platform(s):
- Microsoft Windows Server 2008 R2
- Microsoft Windows Server 2003
- Microsoft Windows 8
- Microsoft Windows Server 2012
- Microsoft Windows 7
- Microsoft Windows Vista
- Microsoft Windows 2000
- Microsoft Windows XP
- Microsoft Windows Server 2008
Class:
vulnerability
Reference(s):
- CVE-2010-0846
Product(s):
- Java Runtime Environment
- Java Development Kit