Vulnerability Name: CVE-2006-6731 (CCN-30983) Assigned: 2006-12-19 Published: 2006-12-19 Updated: 2019-10-09 Summary: Multiple buffer overflows in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 7 and earlier, Java System Development Kit (SDK) and JRE 1.4.2_12 and earlier 1.4.x versions, and SDK and JRE 1.3.1_18 and earlier allow attackers to develop Java applets that read, write, or execute local files, possibly related to (1) integer overflows in the Java_sun_awt_image_ImagingLib_convolveBI, awt_parseRaster, and awt_parseColorModel functions; (2) a stack overflow in the Java_sun_awt_image_ImagingLib_lookupByteRaster function; and (3) improper handling of certain negative values in the Java_sun_font_SunLayoutEngine_nativeLayout function. Note : some of these details are obtained from third party information. CVSS v3 Severity: 9.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): ChangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C )6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): Access Complexity (AC): Authentication (Au): Impact Metrics: Confidentiality (C): Integrity (I): Availibility (A):
7.6 High (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C )5.6 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): Access Complexity (AC): Athentication (Au): Impact Metrics: Confidentiality (C): Integrity (I): Availibility (A):
Vulnerability Type: CWE-Other Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2006-6731 Source: BEA Type: Third Party AdvisoryBEA07-174.00 Source: CCN Type: Apple Web siteAbout the security content of Java Release 6 for Mac OS X 10.4 Source: MISC Type: Third Party Advisoryhttp://docs.info.apple.com/article.html?artnum=307177 Source: HP Type: Third Party AdvisoryHPSBUX02196 Source: APPLE Type: Mailing List, Third Party AdvisoryAPPLE-SA-2007-12-14 Source: SUSE Type: Mailing List, Third Party AdvisorySUSE-SA:2007:003 Source: CCN Type: RHSA-2007-0062Critical: java-1.4.2-ibm security update Source: CCN Type: RHSA-2007-0072Critical: IBMJava2 security update Source: CCN Type: RHSA-2007-0073Critical: java-1.5.0-ibm security update Source: CCN Type: CESA-2005-008Sun JDK sandbox escape via native code vulnerabilities Source: MISC Type: Third Party Advisoryhttp://scary.beasts.org/security/CESA-2005-008.txt Source: CCN Type: SA23445Sun Java JRE Multiple Vulnerabilities Source: SECUNIA Type: Third Party Advisory23445 Source: SECUNIA Type: Third Party Advisory23650 Source: SECUNIA Type: Third Party Advisory23835 Source: SECUNIA Type: Third Party Advisory24099 Source: SECUNIA Type: Third Party Advisory24189 Source: SECUNIA Type: Third Party Advisory24468 Source: CCN Type: SA25283BEA JRockit Multiple Vulnerabilities Source: SECUNIA Type: Third Party Advisory25283 Source: CCN Type: SA25404Gentoo blackdown-jdk and blackdown-jre Vulnerabilities Source: SECUNIA Type: Third Party Advisory25404 Source: CCN Type: SA28115Mac OS X Java Multiple Vulnerabilities Source: SECUNIA Type: Third Party Advisory28115 Source: GENTOO Type: Third Party AdvisoryGLSA-200701-15 Source: GENTOO Type: Third Party AdvisoryGLSA-200702-08 Source: CCN Type: SECTRACK ID: 1017425Java Runtime Environment Buffer Overflows Let Remote Users Execute Arbitrary Code Source: SECTRACK Type: Third Party Advisory, VDB Entry1017425 Source: CCN Type: Sun Alert ID: 102729Security Vulnerabilities in the Java Runtime Environment may Allow Untrusted Applets to Elevate Privileges and Execute Arbitrary Code Source: SUNALERT Type: Broken Link102729 Source: CCN Type: ASA-2007-021Security Vulnerabilities in the Java Runtime Environment may Allow Untrusted Applets to Elevate Privileges and Execute Arbitrary Code (Sun 102729) Source: CCN Type: ASA-2007-090IBMJava2 security update (RHSA-2007-0072) Source: CCN Type: ASA-2007-091java-1.4.2-ibm security update (RHSA-2007-0062) Source: CCN Type: ASA-2007-093java-1.5.0-ibm security update (RHSA-2007-0073) Source: CCN Type: ASA-2007-119HP-UX Java (JRE and JDK) Remote Execution of Arbitrary Code (HPSBUX02196) Source: CCN Type: GLSA-200701-15Sun JDK/JRE: Multiple vulnerabilities Source: CCN Type: GLSA-200702-08AMD64 x86 emulation Sun's J2SE Development Kit: Multiple vulnerabilities Source: CCN Type: GLSA-200705-20Blackdown Java: Applet privilege escalation Source: GENTOO Type: Third Party AdvisoryGLSA-200705-20 Source: CCN Type: US-CERT VU#149457Sun Java JRE vulnerable to arbitrary code execution via an undetermined error Source: CERT-VN Type: Third Party Advisory, US Government ResourceVU#149457 Source: CCN Type: US-CERT VU#939609Sun Java JRE vulnerable to arbitrary code execution via an unspecified error Source: CERT-VN Type: Third Party Advisory, US Government ResourceVU#939609 Source: SUSE Type: Third Party AdvisorySUSE-SA:2007:010 Source: REDHAT Type: Third Party AdvisoryRHSA-2007:0062 Source: REDHAT Type: Third Party AdvisoryRHSA-2007:0072 Source: REDHAT Type: Third Party Advisory, VDB EntryRHSA-2007:0073 Source: BID Type: Patch, Third Party Advisory, VDB Entry21675 Source: CCN Type: BID-21675Sun Java RunTime Environment Multiple Buffer Overflow Vulnerabilities Source: CERT Type: Third Party Advisory, US Government ResourceTA07-022A Source: VUPEN Type: Permissions RequiredADV-2006-5073 Source: VUPEN Type: Permissions RequiredADV-2007-0936 Source: VUPEN Type: Permissions RequiredADV-2007-1814 Source: VUPEN Type: Permissions RequiredADV-2007-4224 Source: XF Type: UNKNOWNsun-java-image-integer-overflow(30983) Source: OVAL Type: Third Party Advisoryoval:org.mitre.oval:def:10134 Source: CCN Type: BEA07-174.00Non-trusted Applets may be able to elevate privileges Source: SUSE Type: SUSE-SA:2007:003Sun Java security update Source: SUSE Type: SUSE-SA:2007:010IBMJava security update Vulnerable Configuration: Configuration 1 :cpe:/a:sun:jdk:1.5.0:-:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update1:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update2:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update3:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update4:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update5:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update6:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update7:*:*:*:*:*:* Configuration 2 :cpe:/a:sun:jre:1.3.1:-:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1_2:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1_03:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1_04:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1_05:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1_06:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1_07:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1_08:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1_09:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1_10:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1_11:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1_12:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1_13:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1_14:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1_15:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1_16:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1_17:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1_18:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2:-:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_1:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_2:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_3:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_4:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_5:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_6:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_7:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_8:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_9:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_10:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_11:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_12:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:-:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update1:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update2:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update3:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update4:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update5:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update6:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update7:*:*:*:*:*:* Configuration 3 :cpe:/a:sun:sdk:1.3.1:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_01:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_02:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_03:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_04:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_05:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_06:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_07:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_08:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_09:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_10:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_11:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_12:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_13:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_14:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_15:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_16:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_17:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_18:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_1:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_2:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_3:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_4:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_5:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_6:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_7:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_8:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_9:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_10:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_11:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_12:*:*:*:*:*:*:* Denotes that component is vulnerableVulnerability Name: CVE-2006-6731 (CCN-30985) Assigned: 2006-12-19 Published: 2006-12-19 Updated: 2006-12-19 Summary: Sun Java Runtime Environment (JRE) is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the Java_sun_awt_image_ImagingLib_lookupByteRaster() function when handling malformed arrays. A remote attacker could exploit this vulnerability to execute arbitrary code on a victim's system, if the attacker could persuade the victim to load a malicious applet. CVSS v3 Severity: 9.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): ChangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C )6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): Access Complexity (AC): Authentication (Au): Impact Metrics: Confidentiality (C): Integrity (I): Availibility (A):
7.6 High (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C )5.6 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): Access Complexity (AC): Athentication (Au): Impact Metrics: Confidentiality (C): Integrity (I): Availibility (A):
Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2006-6731 Source: CCN Type: RHSA-2007-0062Critical: java-1.4.2-ibm security update Source: CCN Type: RHSA-2007-0072Critical: IBMJava2 security update Source: CCN Type: RHSA-2007-0073Critical: java-1.5.0-ibm security update Source: CCN Type: CESA-2005-008Sun JDK sandbox escape via native code vulnerabilities Source: CCN Type: SA23445Sun Java JRE Multiple Vulnerabilities Source: CCN Type: SA25283BEA JRockit Multiple Vulnerabilities Source: CCN Type: SA25404Gentoo blackdown-jdk and blackdown-jre Vulnerabilities Source: CCN Type: SA28115Mac OS X Java Multiple Vulnerabilities Source: CCN Type: SECTRACK ID: 1017425Java Runtime Environment Buffer Overflows Let Remote Users Execute Arbitrary Code Source: CCN Type: Sun Alert ID: 102729Security Vulnerabilities in the Java Runtime Environment may Allow Untrusted Applets to Elevate Privileges and Execute Arbitrary Code Source: CCN Type: ASA-2007-021Security Vulnerabilities in the Java Runtime Environment may Allow Untrusted Applets to Elevate Privileges and Execute Arbitrary Code (Sun 102729) Source: CCN Type: ASA-2007-090IBMJava2 security update (RHSA-2007-0072) Source: CCN Type: ASA-2007-091java-1.4.2-ibm security update (RHSA-2007-0062) Source: CCN Type: ASA-2007-093java-1.5.0-ibm security update (RHSA-2007-0073) Source: CCN Type: ASA-2007-119HP-UX Java (JRE and JDK) Remote Execution of Arbitrary Code (HPSBUX02196) Source: CCN Type: GLSA-200701-15Sun JDK/JRE: Multiple vulnerabilities Source: CCN Type: GLSA-200702-08AMD64 x86 emulation Sun's J2SE Development Kit: Multiple vulnerabilities Source: CCN Type: GLSA-200705-20Blackdown Java: Applet privilege escalation Source: CCN Type: US-CERT VU#149457Sun Java JRE vulnerable to arbitrary code execution via an undetermined error Source: CCN Type: US-CERT VU#939609Sun Java JRE vulnerable to arbitrary code execution via an unspecified error Source: CCN Type: BID-21675Sun Java RunTime Environment Multiple Buffer Overflow Vulnerabilities Source: XF Type: UNKNOWNsun-java-image-array-bo(30985) Source: CCN Type: BEA07-174.00Non-trusted Applets may be able to elevate privileges Source: SUSE Type: SUSE-SA:2007:003Sun Java security update Source: SUSE Type: SUSE-SA:2007:010IBMJava security update Vulnerable Configuration: Configuration CCN 1 :cpe:/a:sun:jre:1.3.1:-:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2:-:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:-:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update3:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_11:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_12:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:-:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update1:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update2:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update3:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update4:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update5:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update6:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update7:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1:update1:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1:update15:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1:update16:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1:update18:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1:update1a:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1:update4:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1:update8:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2:update1:linux:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2:update2:linux:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2:update3:linux:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2:update4:linux:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2:update5:linux:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update1:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update2:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update4:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update5:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update6:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_01:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_16:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_18:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_03:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_08:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_09:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_10:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_04:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_02:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_05:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_06:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_07:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_01:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_02:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_04:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_05:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_06:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_07:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_08:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_09:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_10:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_11:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_12:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_13:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_14:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_15:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_17:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1:update2:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1:update12:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1:update17:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_03:*:*:*:*:*:*:* AND cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_openexchange_server:4.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:* OR cpe:/a:suse:suse_linux_school_server:-:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_standard_server:8.0:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:1.0:*:desktop:*:*:*:*:* OR cpe:/o:novell:linux_desktop:9:*:*:*:*:*:*:* OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:* OR cpe:/o:novell:suse_linux:10.0:*:*:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:* OR cpe:/a:redhat:rhel_extras:3:*:*:*:*:*:*:* OR cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:* OR cpe:/o:novell:suse_linux:10.1:*:*:*:*:*:*:* OR cpe:/o:suse:linux_enterprise_server:9:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:8.0:*:retail_solution:*:*:*:*:* OR cpe:/o:suse:novell_linux_pos:9:*:*:*:*:*:*:* OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:* OR cpe:/o:opensuse:opensuse:10.2:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.3:*:*:*:*:*:*:* Denotes that component is vulnerableVulnerability Name: CVE-2006-6731 (CCN-30989) Assigned: 2006-12-19 Published: 2006-12-19 Updated: 2006-12-19 Summary: Sun Java Runtime Environment (JRE) could allow a remote attacker to execute arbitrary commands on the system caused by an error in the Java_sun_font_SunLayoutEngine_nativeLayout() function when handling negative values. A remote attacker could exploit this vulnerability to execute arbitrary code on a victim's system, if the attacker could persuade the victim to load a malicious applet. CVSS v3 Severity: 9.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): ChangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C )6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): Access Complexity (AC): Authentication (Au): Impact Metrics: Confidentiality (C): Integrity (I): Availibility (A):
7.6 High (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C )5.6 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): Access Complexity (AC): Athentication (Au): Impact Metrics: Confidentiality (C): Integrity (I): Availibility (A):
Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2006-6731 Source: CCN Type: RHSA-2007-0062Critical: java-1.4.2-ibm security update Source: CCN Type: RHSA-2007-0072Critical: IBMJava2 security update Source: CCN Type: RHSA-2007-0073Critical: java-1.5.0-ibm security update Source: CCN Type: CESA-2005-008Sun JDK sandbox escape via native code vulnerabilities Source: CCN Type: SA23445Sun Java JRE Multiple Vulnerabilities Source: CCN Type: SA25283BEA JRockit Multiple Vulnerabilities Source: CCN Type: SA25404Gentoo blackdown-jdk and blackdown-jre Vulnerabilities Source: CCN Type: SA28115Mac OS X Java Multiple Vulnerabilities Source: CCN Type: SECTRACK ID: 1017425Java Runtime Environment Buffer Overflows Let Remote Users Execute Arbitrary Code Source: CCN Type: Sun Alert ID: 102729Security Vulnerabilities in the Java Runtime Environment may Allow Untrusted Applets to Elevate Privileges and Execute Arbitrary Code Source: CCN Type: ASA-2007-021Security Vulnerabilities in the Java Runtime Environment may Allow Untrusted Applets to Elevate Privileges and Execute Arbitrary Code (Sun 102729) Source: CCN Type: ASA-2007-090IBMJava2 security update (RHSA-2007-0072) Source: CCN Type: ASA-2007-091java-1.4.2-ibm security update (RHSA-2007-0062) Source: CCN Type: ASA-2007-093java-1.5.0-ibm security update (RHSA-2007-0073) Source: CCN Type: ASA-2007-119HP-UX Java (JRE and JDK) Remote Execution of Arbitrary Code (HPSBUX02196) Source: CCN Type: GLSA-200701-15Sun JDK/JRE: Multiple vulnerabilities Source: CCN Type: GLSA-200702-08AMD64 x86 emulation Sun's J2SE Development Kit: Multiple vulnerabilities Source: CCN Type: GLSA-200705-20Blackdown Java: Applet privilege escalation Source: CCN Type: US-CERT VU#149457Sun Java JRE vulnerable to arbitrary code execution via an undetermined error Source: CCN Type: US-CERT VU#939609Sun Java JRE vulnerable to arbitrary code execution via an unspecified error Source: CCN Type: BID-21675Sun Java RunTime Environment Multiple Buffer Overflow Vulnerabilities Source: XF Type: UNKNOWNsun-java-sunlayoutengine-command-execution(30989) Source: CCN Type: BEA07-174.00Non-trusted Applets may be able to elevate privileges Source: SUSE Type: SUSE-SA:2007:003Sun Java security update Source: SUSE Type: SUSE-SA:2007:010IBMJava security update Vulnerable Configuration: Configuration CCN 1 :cpe:/a:sun:jre:1.3.1:-:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2:-:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:-:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update3:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_11:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_12:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:-:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update1:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update2:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update3:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update4:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update5:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update6:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update7:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1:update1:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1:update15:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1:update16:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1:update18:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1:update1a:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1:update4:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1:update8:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2:update1:linux:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2:update2:linux:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2:update3:linux:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2:update4:linux:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2:update5:linux:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update1:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update2:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update4:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update5:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update6:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_01:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_16:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_18:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_03:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_08:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_09:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_10:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_04:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_02:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_05:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_06:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_07:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_01:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_02:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_04:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_05:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_06:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_07:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_08:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_09:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_10:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_11:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_12:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_13:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_14:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_15:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_17:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1:update2:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1:update12:*:*:*:*:*:* OR cpe:/a:sun:jre:1.3.1:update17:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.3.1_03:*:*:*:*:*:*:* AND cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_openexchange_server:4.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:* OR cpe:/a:suse:suse_linux_school_server:-:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_standard_server:8.0:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:1.0:*:desktop:*:*:*:*:* OR cpe:/o:novell:linux_desktop:9:*:*:*:*:*:*:* OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:* OR cpe:/o:novell:suse_linux:10.0:*:*:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:* OR cpe:/a:redhat:rhel_extras:3:*:*:*:*:*:*:* OR cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:* OR cpe:/o:novell:suse_linux:10.1:*:*:*:*:*:*:* OR cpe:/o:suse:linux_enterprise_server:9:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:8.0:*:retail_solution:*:*:*:*:* OR cpe:/o:suse:novell_linux_pos:9:*:*:*:*:*:*:* OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:* OR cpe:/o:opensuse:opensuse:10.2:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.3:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions Definition ID Class Title Last Modified oval:org.opensuse.security:def:20066731 V CVE-2006-6731 2015-11-16 oval:org.mitre.oval:def:10134 V Multiple buffer overflows in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 7 and earlier, Java System Development Kit (SDK) and JRE 1.4.2_12 and earlier 1.4.x versions, and SDK and JRE 1.3.1_18 and earlier allow attackers to develop Java applets that read, write, or execute local files, possibly related to (1) integer overflows in the Java_sun_awt_image_ImagingLib_convolveBI, awt_parseRaster, and awt_parseColorModel functions; (2) a stack overflow in the Java_sun_awt_image_ImagingLib_lookupByteRaster function; and (3) improper handling of certain negative values in the Java_sun_font_SunLayoutEngine_nativeLayout function. NOTE: some of these details are obtained from third party information. 2010-09-06
BACK
sun jdk 1.5.0 -
sun jdk 1.5.0 update1
sun jdk 1.5.0 update2
sun jdk 1.5.0 update3
sun jdk 1.5.0 update4
sun jdk 1.5.0 update5
sun jdk 1.5.0 update6
sun jdk 1.5.0 update7
sun jre 1.3.1 -
sun jre 1.3.1_2
sun jre 1.3.1_03
sun jre 1.3.1_04
sun jre 1.3.1_05
sun jre 1.3.1_06
sun jre 1.3.1_07
sun jre 1.3.1_08
sun jre 1.3.1_09
sun jre 1.3.1_10
sun jre 1.3.1_11
sun jre 1.3.1_12
sun jre 1.3.1_13
sun jre 1.3.1_14
sun jre 1.3.1_15
sun jre 1.3.1_16
sun jre 1.3.1_17
sun jre 1.3.1_18
sun jre 1.4.2 -
sun jre 1.4.2_1
sun jre 1.4.2_2
sun jre 1.4.2_3
sun jre 1.4.2_4
sun jre 1.4.2_5
sun jre 1.4.2_6
sun jre 1.4.2_7
sun jre 1.4.2_8
sun jre 1.4.2_9
sun jre 1.4.2_10
sun jre 1.4.2_11
sun jre 1.4.2_12
sun jre 1.5.0 -
sun jre 1.5.0 update1
sun jre 1.5.0 update2
sun jre 1.5.0 update3
sun jre 1.5.0 update4
sun jre 1.5.0 update5
sun jre 1.5.0 update6
sun jre 1.5.0 update7
sun sdk 1.3.1
sun sdk 1.3.1_01
sun sdk 1.3.1_01a
sun sdk 1.3.1_02
sun sdk 1.3.1_03
sun sdk 1.3.1_04
sun sdk 1.3.1_05
sun sdk 1.3.1_06
sun sdk 1.3.1_07
sun sdk 1.3.1_08
sun sdk 1.3.1_09
sun sdk 1.3.1_10
sun sdk 1.3.1_11
sun sdk 1.3.1_12
sun sdk 1.3.1_13
sun sdk 1.3.1_14
sun sdk 1.3.1_15
sun sdk 1.3.1_16
sun sdk 1.3.1_17
sun sdk 1.3.1_18
sun sdk 1.4.2
sun sdk 1.4.2_1
sun sdk 1.4.2_2
sun sdk 1.4.2_3
sun sdk 1.4.2_4
sun sdk 1.4.2_5
sun sdk 1.4.2_6
sun sdk 1.4.2_7
sun sdk 1.4.2_8
sun sdk 1.4.2_9
sun sdk 1.4.2_10
sun sdk 1.4.2_11
sun sdk 1.4.2_12
sun jre 1.3.1 -
sun jre 1.4.2 -
sun jre 1.5.0 -
sun sdk 1.4.2
sun jre 1.5.0 update3
sun sdk 1.4.2_11
sun sdk 1.4.2_12
sun jdk 1.5.0 -
sun jdk 1.5.0 update1
sun jdk 1.5.0 update2
sun jdk 1.5.0 update3
sun jdk 1.5.0 update4
sun jdk 1.5.0 update5
sun jdk 1.5.0 update6
sun jdk 1.5.0 update7
sun jre 1.3.1 update1
sun jre 1.3.1 update15
sun jre 1.3.1 update16
sun jre 1.3.1 update18
sun jre 1.3.1 update1a
sun jre 1.3.1 update4
sun jre 1.3.1 update8
sun jre 1.4.2 update1
sun jre 1.4.2 update2
sun jre 1.4.2 update3
sun jre 1.4.2 update4
sun jre 1.4.2 update5
sun jre 1.5.0 update1
sun jre 1.5.0 update2
sun jre 1.5.0 update4
sun jre 1.5.0 update5
sun jre 1.5.0 update6
sun sdk 1.3.1_01
sun sdk 1.3.1_01a
sun sdk 1.3.1_16
sun sdk 1.3.1_18
sun sdk 1.4.2_03
sun sdk 1.4.2_08
sun sdk 1.4.2_09
sun sdk 1.4.2_10
sun sdk 1.4.2_04
sun sdk 1.4.2_02
sun sdk 1.4.2_05
sun sdk 1.4.2_06
sun sdk 1.4.2_07
sun sdk 1.4.2_01
sun sdk 1.3.1_02
sun sdk 1.3.1_04
sun sdk 1.3.1_05
sun sdk 1.3.1_06
sun sdk 1.3.1_07
sun sdk 1.3.1_08
sun sdk 1.3.1_09
sun sdk 1.3.1_10
sun sdk 1.3.1_11
sun sdk 1.3.1_12
sun sdk 1.3.1_13
sun sdk 1.3.1_14
sun sdk 1.3.1_15
sun sdk 1.3.1_17
sun jre 1.3.1 update2
sun jre 1.3.1 update12
sun jre 1.3.1 update17
sun sdk 1.3.1_03
gentoo linux *
suse linux enterprise server 8
suse suse linux openexchange server 4.0
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
suse suse linux school server -
suse suse linux standard server 8.0
suse suse linux 1.0
novell linux desktop 9
novell open enterprise server *
suse suse linux 10.0
redhat linux advanced workstation 2.1
redhat rhel extras 3
redhat rhel extras 4
suse suse linux 10.1
suse linux enterprise server 9
suse suse linux 8.0
suse novell linux pos 9
novell open enterprise server *
novell opensuse 10.2
suse suse linux 9.3
sun jre 1.3.1 -
sun jre 1.4.2 -
sun jre 1.5.0 -
sun sdk 1.4.2
sun jre 1.5.0 update3
sun sdk 1.4.2_11
sun sdk 1.4.2_12
sun jdk 1.5.0 -
sun jdk 1.5.0 update1
sun jdk 1.5.0 update2
sun jdk 1.5.0 update3
sun jdk 1.5.0 update4
sun jdk 1.5.0 update5
sun jdk 1.5.0 update6
sun jdk 1.5.0 update7
sun jre 1.3.1 update1
sun jre 1.3.1 update15
sun jre 1.3.1 update16
sun jre 1.3.1 update18
sun jre 1.3.1 update1a
sun jre 1.3.1 update4
sun jre 1.3.1 update8
sun jre 1.4.2 update1
sun jre 1.4.2 update2
sun jre 1.4.2 update3
sun jre 1.4.2 update4
sun jre 1.4.2 update5
sun jre 1.5.0 update1
sun jre 1.5.0 update2
sun jre 1.5.0 update4
sun jre 1.5.0 update5
sun jre 1.5.0 update6
sun sdk 1.3.1_01
sun sdk 1.3.1_01a
sun sdk 1.3.1_16
sun sdk 1.3.1_18
sun sdk 1.4.2_03
sun sdk 1.4.2_08
sun sdk 1.4.2_09
sun sdk 1.4.2_10
sun sdk 1.4.2_04
sun sdk 1.4.2_02
sun sdk 1.4.2_05
sun sdk 1.4.2_06
sun sdk 1.4.2_07
sun sdk 1.4.2_01
sun sdk 1.3.1_02
sun sdk 1.3.1_04
sun sdk 1.3.1_05
sun sdk 1.3.1_06
sun sdk 1.3.1_07
sun sdk 1.3.1_08
sun sdk 1.3.1_09
sun sdk 1.3.1_10
sun sdk 1.3.1_11
sun sdk 1.3.1_12
sun sdk 1.3.1_13
sun sdk 1.3.1_14
sun sdk 1.3.1_15
sun sdk 1.3.1_17
sun jre 1.3.1 update2
sun jre 1.3.1 update12
sun jre 1.3.1 update17
sun sdk 1.3.1_03
gentoo linux *
suse linux enterprise server 8
suse suse linux openexchange server 4.0
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
suse suse linux school server -
suse suse linux standard server 8.0
suse suse linux 1.0
novell linux desktop 9
novell open enterprise server *
suse suse linux 10.0
redhat linux advanced workstation 2.1
redhat rhel extras 3
redhat rhel extras 4
suse suse linux 10.1
suse linux enterprise server 9
suse suse linux 8.0
suse novell linux pos 9
novell open enterprise server *
novell opensuse 10.2
suse suse linux 9.3