Vulnerable Systems:
* Sun Microsystems Java Runtime
User interaction is required to exploit this vulnerability in that the target must visit a malicious page.
The specific flaw exists in the processing of JPEG image dimensions. When specifying large values to the dimensions of a subsample an integer overflow occurs leading to memory corruption. Successful exploitation of this vulnerability can lead to remote compromise under the credentials of the currently logged in user.