Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-3874

Опубликовано: 05 нояб. 2009
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 9.3

Описание

Integer overflow in the JPEGImageReader implementation in the ImageI/O component in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via large subsample dimensions in a JPEG file that triggers a heap-based buffer overflow, aka Bug Id 6874643.

РелизСтатусПримечание
dapper

DNE

devel

not-affected

6b17~pre2-0ubuntu3
hardy

released

6b18-1.8.2-4ubuntu1~8.04.1
intrepid

released

6b12-0ubuntu6.6
jaunty

released

6b14-1.4.1-0ubuntu12
karmic

released

6b16-1.6.1-3ubuntu1
lucid

not-affected

6b17~pre2-0ubuntu3
maverick

not-affected

6b17~pre2-0ubuntu3
upstream

released

6b17

Показывать по

РелизСтатусПримечание
dapper

ignored

end of life
devel

DNE

hardy

not-affected

1.5.0-22-0ubuntu0.8.04
intrepid

ignored

end of life, was needs-triage
jaunty

ignored

end of life
karmic

DNE

lucid

DNE

maverick

DNE

upstream

released

1.5.0-22

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

hardy

released

6.20dlj-0ubuntu1.8.04
intrepid

ignored

end of life, was needs-triage
jaunty

released

6.20dlj-0ubuntu1.9.04
karmic

released

6.20dlj-0ubuntu1.9.10
lucid

released

6.20dlj-1ubuntu3
maverick

not-affected

upstream

released

6.17

Показывать по

EPSS

Процентиль: 91%
0.06624
Низкий

9.3 Critical

CVSS2

Связанные уязвимости

redhat
больше 15 лет назад

Integer overflow in the JPEGImageReader implementation in the ImageI/O component in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via large subsample dimensions in a JPEG file that triggers a heap-based buffer overflow, aka Bug Id 6874643.

nvd
больше 15 лет назад

Integer overflow in the JPEGImageReader implementation in the ImageI/O component in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via large subsample dimensions in a JPEG file that triggers a heap-based buffer overflow, aka Bug Id 6874643.

debian
больше 15 лет назад

Integer overflow in the JPEGImageReader implementation in the ImageI/O ...

github
около 3 лет назад

Integer overflow in the JPEGImageReader implementation in the ImageI/O component in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via large subsample dimensions in a JPEG file that triggers a heap-based buffer overflow, aka Bug Id 6874643.

oracle-oval
больше 15 лет назад

ELSA-2009-1584: java-1.6.0-openjdk security update (IMPORTANT)

EPSS

Процентиль: 91%
0.06624
Низкий

9.3 Critical

CVSS2

Уязвимость CVE-2009-3874