CWE
119
Advisory Published
Updated

CVE-2007-0243: Buffer Overflow

First published: Wed Jan 17 2007(Updated: )

Buffer overflow in Sun JDK and Java Runtime Environment (JRE) 5.0 Update 9 and earlier, SDK and JRE 1.4.2_12 and earlier, and SDK and JRE 1.3.1_18 and earlier allows applets to gain privileges via a GIF image with a block with a 0 width field, which triggers memory corruption.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Sun JRE=1.4.2_7
Sun SDK=1.4.2
Sun JRE=1.4.2_4
Sun SDK=1.4.2_10
Sun SDK=1.4.2_12
Sun JDK=1.5.0-update3
Sun JRE=1.4.2_2
Sun JRE=1.4.2_1
Sun JRE=1.4.2_8
Sun JRE=1.5.0-update8
Sun JRE=1.4.2_12
Sun SDK=1.3.1_18
Sun SDK=1.3.1_01
Sun JRE=1.5.0-update7
Sun JRE=1.5.0-update3
Sun SDK=1.3.1_16
Sun SDK=1.3.1_01a
Sun JRE=1.4.2_10
Sun SDK=1.4.2_09
Sun JRE=1.3.1-update16
Sun JDK=1.5.0-update4
Sun JRE=1.5.0-update5
Sun JRE<=1.3.1
Sun JDK=1.5.0-update7
Sun JRE=1.4.2_9
Sun JRE=1.5.0-update6
Sun JRE=1.5.0-update9
Sun JRE=1.4.2_11
Sun JDK=1.5.0-update5
Sun SDK=1.4.2_08
Sun SDK=1.4.2_03
Sun JDK=1.5.0-update8
Sun JRE=1.4.2_3
Sun JRE=1.5.0-update4
Sun JRE=1.4.2_5
Sun JDK<=1.5.0
Sun JRE=1.4.2_6

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203