First published: Mon Jan 16 2017(Updated: )
It was discovered that the PNGImageReader in the javax.imageio package of the 2D component of OpenJDK performed parsing of iTXt and zTXt PNG image chunks even when ignoreMetadata was set to true. An attacker able to make a Java application parse a specially crafted PNG image could cause the application to consume an excessive amount of memory.
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK | =1.6-update_131 | |
Oracle JDK | =1.7-update_121 | |
Oracle JDK | =1.8-update_111 | |
Oracle JDK | =1.8-update_112 | |
Oracle JRE | =1.6-update_131 | |
Oracle JRE | =1.7-update_121 | |
Oracle JRE | =1.8-update_111 | |
Oracle JRE | =1.8-update_112 | |
Oracle JRockit | =r28.3.12 | |
debian/openjdk-8 | 8u432-b06-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.