‘Sun Java Runtime Environment JPEGImageDecoderImpl Code Execution Vulnerability’
‘The information has been provided by Sami Koivu.
The original article can be found at: http://www.zerodayinitiative.com/advisories/ZDI-10-057/‘
Sun Microsystems Java Runtime Environment (JRE)
User interaction is required in that a user must be coerced into executing a malicious java application via visiting a website.
The specific flaw exists within the JPEGImageDecoderImpl interface used by the image processing library to decode JPEG Imagery. By abusing an object meant to specify parameters used by the underlying jpeg decoder a malicious attacker can influence the decoding routine resulting in a heap overflow. This can be exploited to execute arbitrary code in the context of the application.
Sun Microsystems has issued an update to correct this vulnerability. More details can be found at:
2010-01-15 – Vulnerability reported to vendor
2010-04-05 – Coordinated public release of advisory’