‘Sun Java Runtime CMM readMabCurveData Code Execution Vulnerability’

Summary

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Sun’s Java Runtime.’

Credit:

‘The information has been provided by Stephen Fewer.
The original article can be found at: http://www.zerodayinitiative.com/advisories/ZDI-10-061/


Details

Vulnerable Systems:
 * Sun Microsystems Java Runtime Environment (JRE)

User interaction is required to exploit this vulnerability in that the target must visit a malicious page.

The specific flaw exists within the CMM module of the Sun JVM. This module contains a function readMabCurveData. An applet can indirectly call this function and provide it with a malicious curv object. The function trusts the size of the curv element implicitly and copies the data into a fixed-length stack buffer. Exploitation of this issue can lead to arbitrary code execution under the context of the user invoking the applet.

Patch Availability:
Sun Microsystems has issued an update to correct this vulnerability. More details can be found at:
http://www.oracle.com/technology/deploy/security/critical-patch-updates/javacpumar2010.html

CVE Information:
CVE-2010-0838

Disclosure Timeline:
2009-11-09 – Vulnerability reported to vendor
2010-04-05 – Coordinated public release of advisory’

Categories: News