Sun JDK/JRE: Execution of arbitrary code Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) contain a memory corruption flaw that allows the applets to gain elevated privileges potentially leading to the execute of arbitrary code. java February 17, 2007 July 16, 2008: 05 162511 remote 1.5.0.10 1.4.2.18 1.4.2.17 1.4.2.15 1.4.2.14 1.4.2.13 1.5.0.10 1.4.2.13 1.5.0.10 1.4.2.18 1.4.2.17 1.4.2.15 1.4.2.14 1.4.2.13 1.5.0.10 1.4.2.13

The Sun Java Development Kit (JDK) and the Sun Java Runtime Environment (JRE) provide the Sun Java platform.

A anonymous researcher discovered that an error in the handling of a GIF image with a zero width field block leads to a memory corruption flaw.

An attacker could entice a user to run a specially crafted Java applet or application that would load a crafted GIF image, which could result in escalation of privileges and unauthorized access to system resources.

There is no known workaround at this time.

All Sun Java Development Kit 1.5 users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-java/sun-jdk-1.5.0.10"

All Sun Java Development Kit 1.4 users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose "=dev-java/sun-jdk-1.4.2*"

All Sun Java Runtime Environment 1.5 users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-java/sun-jre-bin-1.5.0.10"

All Sun Java Runtime Environment 1.4 users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose "=dev-java/sun-jre-bin-1.4.2*"
CVE-2007-0243 falco falco falco