Gentoo Archives: gentoo-announce

From: Raphael Marichez <falco@g.o>
To: gentoo-announce@g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200702-07 ] Sun JDK/JRE: Execution of arbitrary code
Date: Sat, 17 Feb 2007 22:37:17
Message-Id: 20070217215425.GJ15700@falco.falcal.net
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200702-07
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Sun JDK/JRE: Execution of arbitrary code
9 Date: February 17, 2007
10 Bugs: #162511
11 ID: 200702-07
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Sun Java Development Kit (JDK) and Java Runtime Environment (JRE)
19 contain a memory corruption flaw that allows the applets to gain
20 elevated privileges potentially leading to the execute of arbitrary
21 code.
22
23 Background
24 ==========
25
26 The Sun Java Development Kit (JDK) and the Sun Java Runtime Environment
27 (JRE) provide the Sun Java platform.
28
29 Affected packages
30 =================
31
32 -------------------------------------------------------------------
33 Package / Vulnerable / Unaffected
34 -------------------------------------------------------------------
35 1 dev-java/sun-jdk < 1.5.0.10 >= 1.5.0.10
36 *>= 1.4.2.13
37 dev-java/sun-jdk < 1.4.2.13 >= 1.5.0.10
38 *>= 1.4.2.13
39 2 dev-java/sun-jre-bin < 1.5.0.10 >= 1.5.0.10
40 *>= 1.4.2.13
41 dev-java/sun-jre-bin < 1.4.2.13 >= 1.5.0.10
42 *>= 1.4.2.13
43 -------------------------------------------------------------------
44 2 affected packages on all of their supported architectures.
45 -------------------------------------------------------------------
46
47 Description
48 ===========
49
50 A anonymous researcher discovered that an error in the handling of a
51 GIF image with a zero width field block leads to a memory corruption
52 flaw.
53
54 Impact
55 ======
56
57 An attacker could entice a user to run a specially crafted Java applet
58 or application that would load a crafted GIF image, which could result
59 in escalation of privileges and unauthorized access to system
60 resources.
61
62 Workaround
63 ==========
64
65 There is no known workaround at this time.
66
67 Resolution
68 ==========
69
70 All Sun Java Development Kit 1.5 users should upgrade to the latest
71 version:
72
73 # emerge --sync
74 # emerge --ask --oneshot --verbose ">=dev-java/sun-jdk-1.5.0.10"
75
76 All Sun Java Development Kit 1.4 users should upgrade to the latest
77 version:
78
79 # emerge --sync
80 # emerge --ask --oneshot --verbose "=dev-java/sun-jdk-1.4.2*"
81
82 All Sun Java Runtime Environment 1.5 users should upgrade to the latest
83 version:
84
85 # emerge --sync
86 # emerge --ask --oneshot --verbose ">=dev-java/sun-jre-bin-1.5.0.10"
87
88 All Sun Java Runtime Environment 1.4 users should upgrade to the latest
89 version:
90
91 # emerge --sync
92 # emerge --ask --oneshot --verbose "=dev-java/sun-jre-bin-1.4.2*"
93
94 References
95 ==========
96
97 [ 1 ] CVE-2007-0243
98 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-CVE-2007-0243
99
100 Availability
101 ============
102
103 This GLSA and any updates to it are available for viewing at
104 the Gentoo Security Website:
105
106 http://security.gentoo.org/glsa/glsa-200702-07.xml
107
108 Concerns?
109 =========
110
111 Security is a primary focus of Gentoo Linux and ensuring the
112 confidentiality and security of our users machines is of utmost
113 importance to us. Any security concerns should be addressed to
114 security@g.o or alternatively, you may file a bug at
115 http://bugs.gentoo.org.
116
117 License
118 =======
119
120 Copyright 2007 Gentoo Foundation, Inc; referenced text
121 belongs to its owner(s).
122
123 The contents of this document are licensed under the
124 Creative Commons - Attribution / Share Alike license.
125
126 http://creativecommons.org/licenses/by-sa/2.5