HTTP: Sun Java Runtime Environment Pack200 Decompression Integer Overflow
This signature detects attempts to exploit a known integer overflow vulnerability in Sun Java Runtime Environment software. It is due to insufficient validation while decompressing Pack200 (jar.pack.gz) files. A remote attacker can exploit this by enticing a target user to open a crafted HTML file. A successful attack can lead to arbitrary code execution on the target. The behavior of the target is entirely dependent on the intended function of the injected code. The code executes within the security context of the logged in user. In an un successful attack, the affected process terminates abnormally.
Extended Description
Sun Java Runtime Environment and Java Development Kit are prone to multiple security vulnerabilities. Successful exploits may allow attackers to violate the same-origin policy, obtain sensitive information, bypass security restrictions, run untrusted applets with elevated privileges, and cause denial-of-service conditions. This may result in a compromise of affected computers. These issues affect versions *prior to* the following: JDK and JRE 6 Update 11 JDK and JRE 5.0 Update 17 SDK and JRE 1.4.2_19 SDK and JRE 1.3.1_24
Affected Products
Nortel_networks self-service_speech_server,Avaya interactive_response
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Red_hat
Suse
Apple
Gentoo
Sun
Hp
Avaya
Pardus
Ubuntu
Nortel_networks
Vmware
9.3