CWE
NVD-CWE-Other 119 190
Advisory Published
Updated

CVE-2006-6731: Buffer Overflow

First published: Tue Dec 26 2006(Updated: )

Multiple buffer overflows in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 7 and earlier, Java System Development Kit (SDK) and JRE 1.4.2_12 and earlier 1.4.x versions, and SDK and JRE 1.3.1_18 and earlier allow attackers to develop Java applets that read, write, or execute local files, possibly related to (1) integer overflows in the Java_sun_awt_image_ImagingLib_convolveBI, awt_parseRaster, and awt_parseColorModel functions; (2) a stack overflow in the Java_sun_awt_image_ImagingLib_lookupByteRaster function; and (3) improper handling of certain negative values in the Java_sun_font_SunLayoutEngine_nativeLayout function. NOTE: some of these details are obtained from third party information.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
OpenJDK=1.5.0-update3
OpenJDK=1.5.0-update6
OpenJDK=1.5.0-update1
OpenJDK=1.5.0-update4
OpenJDK=1.5.0-update7
OpenJDK=1.5.0-update5
OpenJDK=1.5.0-update2
OpenJDK=1.5.0
Sun JRE=1.4.2_7
Sun JRE=1.3.1_10
Sun JRE=1.3.1_06
Sun JRE=1.4.2_4
Sun JRE=1.4.2_2
Sun JRE=1.5.0-update2
Sun JRE=1.3.1_2
Sun JRE=1.4.2_1
Sun JRE=1.4.2_8
Sun JRE=1.3.1_16
Sun JRE=1.3.1_11
Sun JRE=1.3.1_17
Sun JRE=1.4.2_12
Sun JRE=1.3.1_12
Sun JRE=1.3.1_03
Sun JRE=1.3.1_14
Sun JRE=1.3.1_08
Sun JRE=1.5.0-update7
Sun JRE=1.5.0-update3
Sun JRE=1.3.1_07
Sun JRE=1.3.1_05
Sun JRE=1.4.2_10
Sun JRE=1.5.0-update5
Sun JRE=1.4.2_9
Sun JRE=1.5.0-update6
Sun JRE=1.3.1_13
Sun JRE=1.3.1_04
Sun JRE=1.3.1_09
Sun JRE=1.4.2_11
Sun JRE=1.5.0-update1
Sun JRE=1.3.1_18
Sun JRE=1.3.1_15
Sun JRE=1.4.2_3
Sun JRE=1.5.0-update4
Sun JRE=1.4.2_5
Sun JRE=1.4.2_6
Sun JRE=1.5.0
Sun JRE=1.4.2
Sun JRE=1.3.1
Sun SDK=1.3.1_03
Sun SDK=1.4.2
Sun SDK=1.3.1
Sun SDK=1.3.1_08
Sun SDK=1.4.2_10
Sun SDK=1.4.2_12
Sun SDK=1.3.1_15
Sun SDK=1.4.2_6
Sun SDK=1.3.1_07
Sun SDK=1.4.2_2
Sun SDK=1.3.1_10
Sun SDK=1.4.2_5
Sun SDK=1.3.1_06
Sun SDK=1.4.2_1
Sun SDK=1.3.1_12
Sun SDK=1.4.2_4
Sun SDK=1.3.1_17
Sun SDK=1.3.1_02
Sun SDK=1.3.1_18
Sun SDK=1.3.1_01
Sun SDK=1.3.1_16
Sun SDK=1.3.1_01a
Sun SDK=1.3.1_14
Sun SDK=1.4.2_7
Sun SDK=1.3.1_13
Sun SDK=1.4.2_8
Sun SDK=1.4.2_11
Sun SDK=1.3.1_09
Sun SDK=1.4.2_9
Sun SDK=1.3.1_04
Sun SDK=1.3.1_05
Sun SDK=1.4.2_3
Sun SDK=1.3.1_11

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Frequently Asked Questions

  • What is the severity of CVE-2006-6731?

    CVE-2006-6731 is classified as a critical vulnerability due to its ability to cause buffer overflows in the Sun Java Development Kit and Java Runtime Environment.

  • How do I fix CVE-2006-6731?

    To resolve CVE-2006-6731, users should update their Java Development Kit or Java Runtime Environment to a version later than 5.0 Update 7, 1.4.2_12, or 1.3.1_18.

  • Which versions are affected by CVE-2006-6731?

    CVE-2006-6731 affects Sun Java Development Kit (JDK) 5.0 Update 7 and earlier, as well as Java Runtime Environment (JRE) versions 1.4.2_12 and earlier and 1.3.1_18 and earlier.

  • What types of attacks can exploit CVE-2006-6731?

    Attackers can exploit CVE-2006-6731 to execute arbitrary code by developing malicious Java applets that perform unwanted actions.

  • Is CVE-2006-6731 a remote code execution vulnerability?

    Yes, CVE-2006-6731 represents a remote code execution vulnerability, enabling attackers to execute arbitrary code on affected systems.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203