HTTP: Sun Java Web Start Splashscreen PNG Processing Buffer Overflow

This signature detects attempts to exploit a known vulnerability in Sun Java Web Start. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected user.

Extended Description

Sun Java Runtime Environment and Java Development Kit are prone to multiple security vulnerabilities. Successful exploits may allow attackers to violate the same-origin policy, obtain sensitive information, bypass security restrictions, run untrusted applets with elevated privileges, and cause denial-of-service conditions. This may result in a compromise of affected computers. These issues affect versions *prior to* the following: JDK and JRE 6 Update 13 JDK and JRE 5.0 Update 18 SDK and JRE 1.4.2_20 SDK and JRE 1.3.1_25

Affected Products

Nortel_networks self-service_speech_server,Red_hat enterprise_linux_supplementary_eus

References

BugTraq: 34240

CVE: CVE-2009-1097

Short Name
HTTP:STC:IMG:SUN-JAVA-PNG-BOF
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Buffer CVE-2009-1097 Java Overflow PNG Processing Splashscreen Start Sun Web bid:34240
Release Date
04/02/2013
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Red_hat

Suse

Apple

Gentoo

Sun

Hp

Avaya

Mandriva

Pardus

Ubuntu

Oracle

Nortel_networks

Debian

Vmware

CVSS Score

9.3

Found a potential security threat?