BUGTRAQ ID: 28125 CVE(CAN) ID: CVE-2008-1193 Solaris系统的Java运行时环境(JRE)为JAVA应用程序提供可靠的运行环境。 Java运行时环境的图形解析库中在解析畸形JPEG图形的ICC配置文件时存在堆溢出漏洞,以下是漏洞代码: Limit = SpGetUInt32 (Buf); ... UInt16Ptr = (KpUInt16_t *)SpMalloc (Limit * (KpInt32_t)sizeof (*UInt16Ptr)); ... for (Index = 0; Index < Limit; Index++) *UInt16Ptr++ = SpGetUInt16 (Buf); ... 如果用户受骗打开了畸形的图形文件的话,就可以触发这个溢出,导致拒绝服务或执行任意代码。 Sun JDK <= 6 Update 4 Sun JDK <= 5.0 Update 14 Sun JRE <= 6 Update 4 Sun JRE <= 5.0 Update 14 RedHat ------ RedHat已经为此发布了一个安全公告(RHSA-2008:0186-01)以及相应补丁: RHSA-2008:0186-01:Critical: java-1.5.0-sun security update 链接:<a href=https://www.redhat.com/support/errata/RHSA-2008-0186.html target=_blank>https://www.redhat.com/support/errata/RHSA-2008-0186.html</a> Sun --- Sun已经为此发布了一个安全公告(Sun-Alert-233325)以及相应补丁: Sun-Alert-233325:Vulnerabilties in the Java Runtime Environment image Parsing Library 链接:<a href=http://sunsolve.sun.com/search/printfriendly.do?assetkey=1-66-233325-1...
BUGTRAQ ID: 28125 CVE(CAN) ID: CVE-2008-1193 Solaris系统的Java运行时环境(JRE)为JAVA应用程序提供可靠的运行环境。 Java运行时环境的图形解析库中在解析畸形JPEG图形的ICC配置文件时存在堆溢出漏洞,以下是漏洞代码: Limit = SpGetUInt32 (Buf); ... UInt16Ptr = (KpUInt16_t *)SpMalloc (Limit * (KpInt32_t)sizeof (*UInt16Ptr)); ... for (Index = 0; Index < Limit; Index++) *UInt16Ptr++ = SpGetUInt16 (Buf); ... 如果用户受骗打开了畸形的图形文件的话,就可以触发这个溢出,导致拒绝服务或执行任意代码。 Sun JDK <= 6 Update 4 Sun JDK <= 5.0 Update 14 Sun JRE <= 6 Update 4 Sun JRE <= 5.0 Update 14 RedHat ------ RedHat已经为此发布了一个安全公告(RHSA-2008:0186-01)以及相应补丁: RHSA-2008:0186-01:Critical: java-1.5.0-sun security update 链接:<a href=https://www.redhat.com/support/errata/RHSA-2008-0186.html target=_blank>https://www.redhat.com/support/errata/RHSA-2008-0186.html</a> Sun --- Sun已经为此发布了一个安全公告(Sun-Alert-233325)以及相应补丁: Sun-Alert-233325:Vulnerabilties in the Java Runtime Environment image Parsing Library 链接:<a href=http://sunsolve.sun.com/search/printfriendly.do?assetkey=1-66-233325-1 target=_blank>http://sunsolve.sun.com/search/printfriendly.do?assetkey=1-66-233325-1</a>