Bug 250725 (CVE-2007-2788) - CVE-2007-2788 Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit
Summary: CVE-2007-2788 Integer overflow in the embedded ICC profile image parser in Su...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2007-2788
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL: http://cve.mitre.org/cgi-bin/cvename....
Whiteboard:
Depends On: 250974 250975 251133 251313 251314 417931 430743 430744 430799 449337
Blocks: 444136
TreeView+ depends on / blocked
 
Reported: 2007-08-03 08:53 UTC by Marc Schoenefeld
Modified: 2019-09-29 12:20 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2013-04-11 21:41:26 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2007:0829 0 normal SHIPPED_LIVE Critical: java-1.5.0-ibm security update 2007-08-07 19:36:59 UTC
Red Hat Product Errata RHSA-2007:0956 0 normal SHIPPED_LIVE Moderate: java-1.5.0-bea security update 2007-10-16 07:08:21 UTC
Red Hat Product Errata RHSA-2007:1086 0 normal SHIPPED_LIVE Moderate: java-1.4.2-bea security update 2007-12-12 12:27:35 UTC
Red Hat Product Errata RHSA-2008:0100 0 normal SHIPPED_LIVE Moderate: java-1.4.2-bea security update 2008-03-11 14:09:38 UTC

Description Marc Schoenefeld 2007-08-03 08:53:25 UTC
Description of problem:


Integer overflow in the embedded ICC profile image parser in Sun Java
Development Kit (JDK) before 1.5.0_11-b03, and 1.6.x before 1.6.0_01-b06, allows
remote attackers to execute arbitrary code or cause a denial of service (JVM
crash) via a crafted JPEG or BMP file.

Comment 9 Vincent Danen 2013-04-11 21:41:26 UTC
The list of fixed products with their respective errata is here:

https://access.redhat.com/security/cve/CVE-2007-2788


Note You need to log in before you can comment on or make changes to this bug.