Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2009-2675

Опубликовано: 05 авг. 2009
Источник: debian

Описание

Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sun-java5fixed1.5.0-20-1package
sun-java5no-dsaetchpackage
sun-java5fixed1.5.0-22-0lenny1lennypackage
sun-java6fixed6-15-1package
sun-java6fixed6-20-0lenny1lennypackage
openjdk-6undeterminedpackage
openjdk-6end-of-lifewheezypackage

Связанные уязвимости

ubuntu
почти 16 лет назад

Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.

redhat
почти 16 лет назад

Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.

nvd
почти 16 лет назад

Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.

github
около 3 лет назад

Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.

oracle-oval
почти 16 лет назад

ELSA-2009-1201: java-1.6.0-openjdk security and bug fix update (IMPORTANT)