‘Sun Java Runtime Environment JPEGImageDecoderImpl Code Execution Vulnerability’

Summary

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Sun’s Java Runtime.’

Credit:

‘The information has been provided by Sami Koivu.
The original article can be found at: http://www.zerodayinitiative.com/advisories/ZDI-10-057/


Details

Vulnerable Systems:
Sun Microsystems Java Runtime Environment (JRE)

User interaction is required in that a user must be coerced into executing a malicious java application via visiting a website.

The specific flaw exists within the JPEGImageDecoderImpl interface used by the image processing library to decode JPEG Imagery. By abusing an object meant to specify parameters used by the underlying jpeg decoder a malicious attacker can influence the decoding routine resulting in a heap overflow. This can be exploited to execute arbitrary code in the context of the application.

Patch Availability:
Sun Microsystems has issued an update to correct this vulnerability. More details can be found at:
http://www.oracle.com/technology/deploy/security/critical-patch-updates/javacpumar2010.html

CVE Information:
CVE-2010-0849

Disclosure Timeline:
2010-01-15 – Vulnerability reported to vendor
2010-04-05 – Coordinated public release of advisory’

Categories: News