First published: Mon Jan 16 2017(Updated: )
It was discovered that the PNGImageReader in the javax.imageio package of the 2D component of OpenJDK performed parsing of iTXt and zTXt PNG image chunks even when ignoreMetadata was set to true. An attacker able to make a Java application parse a specially crafted PNG image could cause the application to consume an excessive amount of memory.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK 6 | =1.6-update_131 | |
Oracle JDK 6 | =1.7-update_121 | |
Oracle JDK 6 | =1.8-update_111 | |
Oracle JDK 6 | =1.8-update_112 | |
Oracle Java Runtime Environment (JRE) | =1.6-update_131 | |
Oracle Java Runtime Environment (JRE) | =1.7-update_121 | |
Oracle Java Runtime Environment (JRE) | =1.8-update_111 | |
Oracle Java Runtime Environment (JRE) | =1.8-update_112 | |
BEA JRockit | =r28.3.12 | |
debian/openjdk-8 | 8u442-ga-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3253 is classified as a medium severity vulnerability.
To fix CVE-2017-3253, update your Java Development Kit (JDK) or Java Runtime Environment (JRE) to the latest version that addresses this vulnerability.
CVE-2017-3253 affects Oracle JDK versions 1.6-update_131, 1.7-update_121, and 1.8-update_111 and 1.8-update_112.
Yes, CVE-2017-3253 is specifically related to the parsing of iTXt and zTXt PNG image chunks in OpenJDK.
Any application that uses affected versions of Oracle JDK or JRE and processes specially crafted PNG images is at risk from CVE-2017-3253.