HTTP: Oracle Java Soundbank Resource Name Stack Buffer Overflow
This signature detects attempts to exploit a known stack buffer overflow vulnerability in Oracle Java Runtime. It is due to a sign-extension error when parsing the length of a resource name in a Soundbank file. A remote unauthenticated attacker can exploit this by enticing a target user to open a malicious Java applet with a vulnerable application. In a successful attack, where arbitrary code is injected and executed on the target host, the behavior of the target system is dependent on the malicious code. Note that any code executed by the attacker runs with the privileges of the logged in user. In an unsuccessful attack, the application terminates abnormally.
Extended Description
Oracle Java SE and Java for Business are prone to a remote vulnerability in Sound. The vulnerability can be exploited over multiple protocols. An attacker does not require privileges to exploit this vulnerability. This vulnerability affects the following supported versions: 6 Update 18, 5.0 Update 23, 1.4.2_25, 1.3.1_27
Affected Products
Sun sdk_(windows_production_release)
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Red_hat
Suse
Gentoo
Sun
Hp
Avaya
Pardus
Oracle
Vmware
7.5