|
|
| |
Credit:
The information has been provided by Stephen Fewer.
The original article can be found at: http://www.zerodayinitiative.com/advisories/ZDI-10-061/
|
| |
Vulnerable Systems:
* Sun Microsystems Java Runtime Environment (JRE)
User interaction is required to exploit this vulnerability in that the target must visit a malicious page.
The specific flaw exists within the CMM module of the Sun JVM. This module contains a function readMabCurveData. An applet can indirectly call this function and provide it with a malicious curv object. The function trusts the size of the curv element implicitly and copies the data into a fixed-length stack buffer. Exploitation of this issue can lead to arbitrary code execution under the context of the user invoking the applet.
Patch Availability:
Sun Microsystems has issued an update to correct this vulnerability. More details can be found at:
http://www.oracle.com/technology/deploy/security/critical-patch-updates/javacpumar2010.html
CVE Information:
CVE-2010-0838
Disclosure Timeline:
2009-11-09 - Vulnerability reported to vendor
2010-04-05 - Coordinated public release of advisory
|
|
|