HTTP: Sun Java Runtime Environment JAR File Processing Stack Buffer Overflow
This signature detects attempts to exploit a known stack buffer overflow vulnerability in Sun Java Runtime Environment software. It is due to insufficient validation while processing Java ARchive (JAR) files. A remote attacker can exploit this by enticing a target user to open a crafted JAR file. A successful attack can lead to arbitrary code execution on the target. The behavior of the target is entirely dependent on the intended function of the injected code and executes within the security context of the logged in user. In an unsuccessful attack, the affected process terminates abnormally.
Extended Description
Sun Java Runtime Environment and Java Development Kit are prone to multiple security vulnerabilities. Successful exploits may allow attackers to violate the same-origin policy, obtain sensitive information, bypass security restrictions, run untrusted applets with elevated privileges, and cause denial-of-service conditions. This may result in a compromise of affected computers. These issues affect versions *prior to* the following: JDK and JRE 6 Update 11 JDK and JRE 5.0 Update 17 SDK and JRE 1.4.2_19 SDK and JRE 1.3.1_24
Affected Products
Nortel_networks self-service_speech_server,Avaya interactive_response
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Red_hat
Suse
Apple
Gentoo
Sun
Hp
Avaya
Pardus
Ubuntu
Nortel_networks
Vmware
9.3