Revision Date: | 2013-04-29 | Version: | 12 | Title: | Unspecified vulnerability in the Java 2D component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is a heap-based buffer overflow that allows arbitrary code execution via a crafted image. | Description: | Unspecified vulnerability in the Java 2D component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is a heap-based buffer overflow that allows arbitrary code execution via a crafted image. | Family: | unix | Class: | vulnerability | Status: | ACCEPTED | Reference(s): | CVE-2010-0847
| Platform(s): | CentOS Linux 5 Oracle Linux 5 Red Hat Enterprise Linux 5
| Product(s): | | Definition Synopsis | RHEL5, CentOS5 or Oracle Linux 5 The operating system installed on the system is Red Hat Enterprise Linux 5
OR The operating system installed on the system is CentOS Linux 5.x
OR Oracle Linux 5.x
AND Configuration section
java-1.6.0-openjdk-src is earlier than 1:1.6.0.0-1.11.b16.el5
OR java-1.6.0-openjdk-javadoc is earlier than 1:1.6.0.0-1.11.b16.el5
OR java-1.6.0-openjdk-demo is earlier than 1:1.6.0.0-1.11.b16.el5
OR java-1.6.0-openjdk-devel is earlier than 1:1.6.0.0-1.11.b16.el5
OR java-1.6.0-openjdk is earlier than 1:1.6.0.0-1.11.b16.el5
|
|