First published: Mon Jan 18 2016(Updated: )
Unspecified vulnerability in Oracle Java SE 6u105, 7u91, and 8u66; Java SE Embedded 8u65; and JRockit R28.3.8 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that this is a heap-based buffer overflow in the readImage function, which allows remote attackers to execute arbitrary code via crafted image data.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK 6 | =1.6.0-update105 | |
Oracle JDK 6 | =1.7.0-update91 | |
Oracle JDK 6 | =1.8.0-update66 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update105 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update91 | |
Oracle Java Runtime Environment (JRE) | =1.8.0-update66 | |
BEA JRockit | =r28.3.8 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.04 | |
Ubuntu | =15.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0483 has a high severity rating as it can affect confidentiality, integrity, and availability.
To fix CVE-2016-0483, update Oracle Java SE to the latest version provided by Oracle.
CVE-2016-0483 affects Oracle Java SE 6u105, 7u91, 8u66 and Java SE Embedded 8u65 as well as JRockit R28.3.8.
Yes, CVE-2016-0483 can be exploited remotely by attackers via specific vectors related to AWT.
The impact of CVE-2016-0483 can lead to potential unauthorized access or manipulation of system resources.