7.5
CWE
119
Advisory Published
Updated

CVE-2010-0849: Buffer Overflow

First published: Thu Apr 01 2010(Updated: )

Unspecified vulnerability in the Java 2D component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is a heap-based buffer overflow in a decoding routine used by the JPEGImageDecoderImpl interface, which allows code execution via a crafted JPEG image.

Credit: secalert_us@oracle.com

Affected SoftwareAffected VersionHow to fix
Sun JRE=1.6.0-update_3
Sun JRE=1.6.0-update_5
Sun JRE=1.6.0-update_13
Sun JRE=1.6.0-update_1
Sun JRE=1.6.0-update_2
Sun JRE=1.6.0-update_16
Sun JRE=1.6.0-update_15
Sun JRE=1.6.0-update_6
Sun JRE=1.6.0
Sun JRE=1.6.0-update_10
Sun JRE=1.6.0-update_17
Sun JRE<=1.6.0
Sun JRE=1.6.0-update_7
Sun JRE=1.6.0-update_14
Sun JRE=1.6.0-update_4
Sun JRE=1.6.0-update_12
Sun JRE=1.6.0-update_11
Sun JDK=1.6.0-update_4
Sun JDK=1.6.0-update_7
Sun JDK=1.6.0-update_13
Sun JDK=1.6.0-update_3
Sun JDK=1.6.0-update_11
Sun JDK=1.6.0-update_10
Sun JDK=1.6.0-update_14
Sun JDK=1.6.0
Sun JDK=1.6.0-update_17
Sun JDK=1.6.0-update_5
Sun JDK=1.6.0-update2
Sun JDK=1.6.0-update1_b06
Sun JDK=1.6.0-update_16
Sun JDK=1.6.0-update1
Sun JDK<=1.6.0
Sun JDK=1.6.0-update_15
Sun JDK=1.6.0-update_12
Sun JDK=1.6.0-update_6
Sun JDK=1.5.0-update20
Sun JDK=1.5.0-update15
Sun JDK=1.5.0-update18
Sun JDK=1.5.0-update3
Sun JDK<=1.5.0
Sun JDK=1.5.0-update21
Sun JDK=1.5.0-update11
Sun JDK=1.5.0-update16
Sun JDK=1.5.0-update17
Sun JDK=1.5.0-update9
Sun JDK=1.5.0-update22
Sun JDK=1.5.0-update6
Sun JDK=1.5.0-update14
Sun JDK=1.5.0-update1
Sun JDK=1.5.0-update4
Sun JDK=1.5.0-update7
Sun JDK=1.5.0
Sun JDK=1.5.0-update12
Sun JDK=1.5.0-update5
Sun JDK=1.5.0-update2
Sun JDK=1.5.0-update19
Sun JDK=1.5.0-update13
Sun JDK=1.5.0-update8
Sun JDK=1.5.0-update10
Sun SDK=1.4.2_19
Sun SDK=1.4.2
Sun SDK=1.4.2_10
Sun SDK=1.4.2_12
Sun SDK=1.4.2_17
Sun SDK=1.4.2_14
Sun SDK=1.4.2_21
Sun SDK=1.4.2_13
Sun SDK=1.4.2_6
Sun SDK=1.4.2_23
Sun SDK=1.4.2_5
Sun SDK=1.4.2_1
Sun SDK=1.4.2_18
Sun SDK=1.4.2_4
Sun SDK=1.4.2_22
Sun SDK=1.4.2_7
Sun SDK=1.4.2_8
Sun SDK=1.4.2_02
Sun SDK=1.4.2_16
Sun SDK=1.4.2_11
Sun SDK=1.4.2_9
Sun SDK<=1.4.2_25
Sun SDK=1.4.2_20
Sun SDK=1.4.2_3
Sun SDK=1.4.2_24
Sun SDK=1.4.2_15
Sun JRE=1.5.0-update22
Sun JRE=1.5.0
Sun JRE<=1.5.0
Sun JRE=1.5.0-update18
Sun JRE=1.5.0-update2
Sun JRE=1.5.0-update13
Sun JRE=1.5.0-update12
Sun JRE=1.5.0-update8
Sun JRE=1.5.0-update16
Sun JRE=1.5.0-update21
Sun JRE=1.5.0-update11
Sun JRE=1.5.0-update15
Sun JRE=1.5.0-update7
Sun JRE=1.5.0-update3
Sun JRE=1.5.0-update20
Sun JRE=1.5.0-update5
Sun JRE=1.5.0-update14
Sun JRE=1.5.0-update6
Sun JRE=1.5.0-update9
Sun JRE=1.5.0-update1
Sun JRE=1.5.0-update19
Sun JRE=1.5.0-update10
Sun JRE=1.5.0-update4
Sun JRE=1.5.0-update17
Sun JRE=1.4.2_7
Sun JRE=1.4.2_16
Sun JRE=1.4.2_24
Sun JRE=1.4.2_4
Sun JRE=1.4.2_2
Sun JRE=1.4.2_19
Sun JRE=1.4.2_15
Sun JRE=1.4.2_13
Sun JRE=1.4.2_1
Sun JRE=1.4.2_8
Sun JRE=1.4.2_12
Sun JRE<=1.4.2_25
Sun JRE=1.4.2_18
Sun JRE=1.4.2_22
Sun JRE=1.4.2_14
Sun JRE=1.4.2_10
Sun JRE=1.4.2_17
Sun JRE=1.4.2_9
Sun JRE=1.4.2
Sun JRE=1.4.2_21
Sun JRE=1.4.2_11
Sun JRE=1.4.2_23
Sun JRE=1.4.2_3
Sun JRE=1.4.2_20
Sun JRE=1.4.2_5
Sun JRE=1.4.2_6
Sun JDK=1.3.1_16
Sun JDK=1.3.1_02
Sun JDK<=1.3.1_27
Sun JDK=1.3.1_12
Sun JDK=1.3.1_14
Sun JDK=1.3.1_19
Sun JDK=1.3.1_25
Sun JDK=1.3.1_04
Sun JDK=1.3.1_21
Sun JDK=1.3.1_05
Sun JDK=1.3.1_09
Sun JDK=1.3.1_03
Sun JDK=1.3.1_26
Sun JDK=1.3.1_11
Sun JDK=1.3.0_03
Sun JDK=1.3.1_17
Sun JDK=1.3.1_15
Sun JDK=1.3.1_01a
Sun JDK=1.3.1_07
Sun JDK=1.3.1_13
Sun JDK=1.3.0
Sun JDK=1.3.1_08
Sun JDK=1.3.0_01
Sun JDK=1.3.0_04
Sun JDK=1.3.1_20
Sun JDK=1.3.1_24
Sun JDK=1.3.1_18
Sun JDK=1.3.0_02
Sun JDK=1.3.1_10
Sun JDK=1.3.1_06
Sun JDK=1.3.1_23
Sun JDK=1.3.1_22
Sun JDK=1.3.1_01
Sun JDK=1.3.0_05
Sun JDK=1.3.1
Sun JRE=1.3.1
Sun JRE=1.3.1_10
Sun JRE=1.3.1_06
Sun JRE=1.3.0-update1
Sun JRE=1.3.1_20
Sun JRE=1.3.1_22
Sun JRE=1.3.1_25
Sun JRE=1.3.0-update4
Sun JRE=1.3.1_2
Sun JRE=1.3.1_16
Sun JRE=1.3.1-update2
Sun JRE=1.3.1_19
Sun JRE=1.3.1_11
Sun JRE=1.3.1_17
Sun JRE=1.3.1_12
Sun JRE=1.3.1_03
Sun JRE=1.3.1_14
Sun JRE=1.3.1_24
Sun JRE=1.3.1-update1
Sun JRE=1.3.0-update5
Sun JRE=1.3.1_08
Sun JRE=1.3.1_07
Sun JRE=1.3.1_05
Sun JRE=1.3.0
Sun JRE=1.3.0-update2
Sun JRE=1.3.0-update3
Sun JRE=1.3.1_13
Sun JRE=1.3.1_04
Sun JRE=1.3.1_09
Sun JRE<=1.3.1_27
Sun JRE=1.3.1_18
Sun JRE=1.3.1_23
Sun JRE=1.3.1_15
Sun JRE=1.3.1_26
Sun JRE=1.3.1_21
Sun SDK=1.3.1_03
Sun SDK=1.3.1_23
Sun SDK=1.3.1_19
Sun SDK=1.3.1
Sun SDK=1.3.1_08
Sun SDK=1.3.1_25
Sun SDK<=1.3.1_27
Sun SDK=1.3.1_15
Sun SDK=1.3.1_07
Sun SDK=1.3.1_10
Sun SDK=1.3.1_06
Sun SDK=1.3.1_12
Sun SDK=1.3.0_01
Sun SDK=1.3.1_20
Sun SDK=1.3.1_17
Sun SDK=1.3.1_02
Sun SDK=1.3.1_18
Sun SDK=1.3.1_01
Sun SDK=1.3.1_16
Sun SDK=1.3.1_01a
Sun SDK=1.3.1_22
Sun SDK=1.3.1_14
Sun SDK=1.3.1_13
Sun SDK=1.3.0_04
Sun SDK=1.3.0
Sun SDK=1.3.1_24
Sun SDK=1.3.0_03
Sun SDK=1.3.1_09
Sun SDK=1.3.1_04
Sun SDK=1.3.1_21
Sun SDK=1.3.1_05
Sun SDK=1.3.0_05
Sun SDK=1.3.0_02
Sun SDK=1.3.1_11
Sun SDK=1.3.1_26

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203