Integer signedness error in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via crafted glyph descriptions in a Type1 font, which bypasses a signed comparison and triggers a buffer overflow.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Java_runtime_environment | Sun | 5.0 (including) | 5.0 (including) |
Java_runtime_environment | Sun | 6.0 (including) | 6.0 (including) |
Java_se_development_kit | Sun | * | * |
Extras for RHEL 4 | RedHat | java-1.6.0-sun-1:1.6.0.13-1jpp.1.el4 | * |
Extras for RHEL 4 | RedHat | java-1.5.0-sun-0:1.5.0.18-1jpp.1.el4 | * |
Extras for RHEL 4 | RedHat | java-1.5.0-ibm-1:1.5.0.9-1jpp.5.el4 | * |
Extras for RHEL 4 | RedHat | java-1.6.0-ibm-1:1.6.0.5-1jpp.1.el4 | * |
Red Hat Network Satellite Server v 5.1 | RedHat | java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4 | * |
Red Hat Network Satellite Server v 5.3 | RedHat | java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4 | * |
Supplementary for Red Hat Enterprise Linux 5 | RedHat | java-1.6.0-sun-1:1.6.0.13-1jpp.1.el5 | * |
Supplementary for Red Hat Enterprise Linux 5 | RedHat | java-1.5.0-sun-0:1.5.0.18-1jpp.1.el5 | * |
Supplementary for Red Hat Enterprise Linux 5 | RedHat | java-1.5.0-ibm-1:1.5.0.9-1jpp.3.el5 | * |
Supplementary for Red Hat Enterprise Linux 5 | RedHat | java-1.6.0-ibm-1:1.6.0.5-1jpp.1.el5 | * |
Sun-java5 | Ubuntu | dapper | * |
Sun-java5 | Ubuntu | gutsy | * |
Sun-java5 | Ubuntu | intrepid | * |
Sun-java5 | Ubuntu | upstream | * |
Sun-java6 | Ubuntu | gutsy | * |
Sun-java6 | Ubuntu | hardy | * |
Sun-java6 | Ubuntu | intrepid | * |
Sun-java6 | Ubuntu | jaunty | * |
Sun-java6 | Ubuntu | karmic | * |
Sun-java6 | Ubuntu | lucid | * |
Sun-java6 | Ubuntu | upstream | * |