Wednesday, May 16, 2007

Sun's JDK Executes Code From Images

Via heise Security News.

Due to errors in Sun's Java Development Kit attackers could execute arbitrary code or crash systems that use the JDK to process images server-side. Chris Evans from the Google Security Team has published an advisory on these vulnerabilities, including links to files for demonstration purposes.

Manipulated JPEG images with integrated ICC colour profiles may be used to infiltrate malicious code into the JDK. These images are parsed without range-checking the values in the ICC profile. Excessively large values cause an integer overflow and a subsequent buffer overflow. Under Linux, manipulated BMP files may cause the image parsing thread to hang while trying to read from /dev/tty.

More here.

0 Comments:

Post a Comment

<< Home