HTTP: Sun Java Web Start Splashscreen PNG Processing Buffer Overflow
This signature detects attempts to exploit a known vulnerability in Sun Java Web Start. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected user.
Extended Description
Sun Java Runtime Environment and Java Development Kit are prone to multiple security vulnerabilities. Successful exploits may allow attackers to violate the same-origin policy, obtain sensitive information, bypass security restrictions, run untrusted applets with elevated privileges, and cause denial-of-service conditions. This may result in a compromise of affected computers. These issues affect versions *prior to* the following: JDK and JRE 6 Update 13 JDK and JRE 5.0 Update 18 SDK and JRE 1.4.2_20 SDK and JRE 1.3.1_25
Affected Products
Nortel_networks self-service_speech_server,Red_hat enterprise_linux_supplementary_eus
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Red_hat
Suse
Apple
Gentoo
Sun
Hp
Avaya
Mandriva
Pardus
Ubuntu
Oracle
Nortel_networks
Debian
Vmware
9.3