CVE-2006-6731
Multiple buffer overflows in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 7 and earlier, Java System Development Kit (SDK) and JRE 1.4.2_12 and earlier 1.4.x versions, and SDK and JRE 1.3.1_18 and earlier allow attackers to develop Java applets that read, write, or execute local files, possibly related to (1) integer overflows in the Java_sun_awt_image_ImagingLib_convolveBI, awt_parseRaster, and awt_parseColorModel functions; (2) a stack overflow in the Java_sun_awt_image_ImagingLib_lookupByteRaster function; and (3) improper handling of certain negative values in the Java_sun_font_SunLayoutEngine_nativeLayout function. NOTE: some of these details are obtained from third party information.
Published
2006-12-26T23:28:00.000
Last Modified
2025-04-09T00:30:58.490
Status
Deferred
Source
[email protected]
Severity
CVSSv2: 9.3 (HIGH)
CVSSv2 Vector
AV:N/AC:M/Au:N/C:C/I:C/A:C
- Access Vector: NETWORK
- Access Complexity: MEDIUM
- Authentication: NONE
- Confidentiality Impact: COMPLETE
- Integrity Impact: COMPLETE
- Availability Impact: COMPLETE
Exploitability Score
8.6
Impact Score
10.0
Weaknesses
-
Type: Primary
NVD-CWE-Other
Affected Vendors & Products
Type |
Vendor |
Product |
Version/Range |
Vulnerable? |
Application |
sun
|
jdk
|
1.5.0 |
Yes
|
Application |
sun
|
jdk
|
1.5.0 |
Yes
|
Application |
sun
|
jdk
|
1.5.0 |
Yes
|
Application |
sun
|
jdk
|
1.5.0 |
Yes
|
Application |
sun
|
jdk
|
1.5.0 |
Yes
|
Application |
sun
|
jdk
|
1.5.0 |
Yes
|
Application |
sun
|
jdk
|
1.5.0 |
Yes
|
Application |
sun
|
jdk
|
1.5.0 |
Yes
|
Application |
sun
|
jre
|
1.3.1 |
Yes
|
Application |
sun
|
jre
|
1.3.1_2 |
Yes
|
Application |
sun
|
jre
|
1.3.1_03 |
Yes
|
Application |
sun
|
jre
|
1.3.1_04 |
Yes
|
Application |
sun
|
jre
|
1.3.1_05 |
Yes
|
Application |
sun
|
jre
|
1.3.1_06 |
Yes
|
Application |
sun
|
jre
|
1.3.1_07 |
Yes
|
Application |
sun
|
jre
|
1.3.1_08 |
Yes
|
Application |
sun
|
jre
|
1.3.1_09 |
Yes
|
Application |
sun
|
jre
|
1.3.1_10 |
Yes
|
Application |
sun
|
jre
|
1.3.1_11 |
Yes
|
Application |
sun
|
jre
|
1.3.1_12 |
Yes
|
Application |
sun
|
jre
|
1.3.1_13 |
Yes
|
Application |
sun
|
jre
|
1.3.1_14 |
Yes
|
Application |
sun
|
jre
|
1.3.1_15 |
Yes
|
Application |
sun
|
jre
|
1.3.1_16 |
Yes
|
Application |
sun
|
jre
|
1.3.1_17 |
Yes
|
Application |
sun
|
jre
|
1.3.1_18 |
Yes
|
Application |
sun
|
jre
|
1.4.2 |
Yes
|
Application |
sun
|
jre
|
1.4.2_1 |
Yes
|
Application |
sun
|
jre
|
1.4.2_2 |
Yes
|
Application |
sun
|
jre
|
1.4.2_3 |
Yes
|
Application |
sun
|
jre
|
1.4.2_4 |
Yes
|
Application |
sun
|
jre
|
1.4.2_5 |
Yes
|
Application |
sun
|
jre
|
1.4.2_6 |
Yes
|
Application |
sun
|
jre
|
1.4.2_7 |
Yes
|
Application |
sun
|
jre
|
1.4.2_8 |
Yes
|
Application |
sun
|
jre
|
1.4.2_9 |
Yes
|
Application |
sun
|
jre
|
1.4.2_10 |
Yes
|
Application |
sun
|
jre
|
1.4.2_11 |
Yes
|
Application |
sun
|
jre
|
1.4.2_12 |
Yes
|
Application |
sun
|
jre
|
1.5.0 |
Yes
|
Application |
sun
|
jre
|
1.5.0 |
Yes
|
Application |
sun
|
jre
|
1.5.0 |
Yes
|
Application |
sun
|
jre
|
1.5.0 |
Yes
|
Application |
sun
|
jre
|
1.5.0 |
Yes
|
Application |
sun
|
jre
|
1.5.0 |
Yes
|
Application |
sun
|
jre
|
1.5.0 |
Yes
|
Application |
sun
|
jre
|
1.5.0 |
Yes
|
Application |
sun
|
sdk
|
1.3.1 |
Yes
|
Application |
sun
|
sdk
|
1.3.1_01 |
Yes
|
Application |
sun
|
sdk
|
1.3.1_01a |
Yes
|
Application |
sun
|
sdk
|
1.3.1_02 |
Yes
|
Application |
sun
|
sdk
|
1.3.1_03 |
Yes
|
Application |
sun
|
sdk
|
1.3.1_04 |
Yes
|
Application |
sun
|
sdk
|
1.3.1_05 |
Yes
|
Application |
sun
|
sdk
|
1.3.1_06 |
Yes
|
Application |
sun
|
sdk
|
1.3.1_07 |
Yes
|
Application |
sun
|
sdk
|
1.3.1_08 |
Yes
|
Application |
sun
|
sdk
|
1.3.1_09 |
Yes
|
Application |
sun
|
sdk
|
1.3.1_10 |
Yes
|
Application |
sun
|
sdk
|
1.3.1_11 |
Yes
|
Application |
sun
|
sdk
|
1.3.1_12 |
Yes
|
Application |
sun
|
sdk
|
1.3.1_13 |
Yes
|
Application |
sun
|
sdk
|
1.3.1_14 |
Yes
|
Application |
sun
|
sdk
|
1.3.1_15 |
Yes
|
Application |
sun
|
sdk
|
1.3.1_16 |
Yes
|
Application |
sun
|
sdk
|
1.3.1_17 |
Yes
|
Application |
sun
|
sdk
|
1.3.1_18 |
Yes
|
Application |
sun
|
sdk
|
1.4.2 |
Yes
|
Application |
sun
|
sdk
|
1.4.2_1 |
Yes
|
Application |
sun
|
sdk
|
1.4.2_2 |
Yes
|
Application |
sun
|
sdk
|
1.4.2_3 |
Yes
|
Application |
sun
|
sdk
|
1.4.2_4 |
Yes
|
Application |
sun
|
sdk
|
1.4.2_5 |
Yes
|
Application |
sun
|
sdk
|
1.4.2_6 |
Yes
|
Application |
sun
|
sdk
|
1.4.2_7 |
Yes
|
Application |
sun
|
sdk
|
1.4.2_8 |
Yes
|
Application |
sun
|
sdk
|
1.4.2_9 |
Yes
|
Application |
sun
|
sdk
|
1.4.2_10 |
Yes
|
Application |
sun
|
sdk
|
1.4.2_11 |
Yes
|
Application |
sun
|
sdk
|
1.4.2_12 |
Yes
|
References
-
http://dev2dev.bea.com/pub/advisory/243
Third Party Advisory
([email protected])
-
http://docs.info.apple.com/article.html?artnum=307177
Third Party Advisory
([email protected])
-
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00876579
Third Party Advisory
([email protected])
-
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00876579
Third Party Advisory
([email protected])
-
http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html
Mailing List, Third Party Advisory
([email protected])
-
http://lists.suse.com/archive/suse-security-announce/2007-Jan/0003.html
Mailing List, Third Party Advisory
([email protected])
-
http://scary.beasts.org/security/CESA-2005-008.txt
Third Party Advisory
([email protected])
-
http://secunia.com/advisories/23445
Third Party Advisory
([email protected])
-
http://secunia.com/advisories/23650
Third Party Advisory
([email protected])
-
http://secunia.com/advisories/23835
Third Party Advisory
([email protected])
-
http://secunia.com/advisories/24099
Third Party Advisory
([email protected])
-
http://secunia.com/advisories/24189
Third Party Advisory
([email protected])
-
http://secunia.com/advisories/24468
Third Party Advisory
([email protected])
-
http://secunia.com/advisories/25283
Third Party Advisory
([email protected])
-
http://secunia.com/advisories/25404
Third Party Advisory
([email protected])
-
http://secunia.com/advisories/28115
Third Party Advisory
([email protected])
-
http://security.gentoo.org/glsa/glsa-200701-15.xml
Third Party Advisory
([email protected])
-
http://security.gentoo.org/glsa/glsa-200702-08.xml
Third Party Advisory
([email protected])
-
http://securitytracker.com/id?1017425
Third Party Advisory, VDB Entry
([email protected])
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102729-1
Broken Link
([email protected])
-
http://www.gentoo.org/security/en/glsa/glsa-200705-20.xml
Third Party Advisory
([email protected])
-
http://www.kb.cert.org/vuls/id/149457
Third Party Advisory, US Government Resource
([email protected])
-
http://www.kb.cert.org/vuls/id/939609
Third Party Advisory, US Government Resource
([email protected])
-
http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html
Third Party Advisory
([email protected])
-
http://www.redhat.com/support/errata/RHSA-2007-0062.html
Third Party Advisory
([email protected])
-
http://www.redhat.com/support/errata/RHSA-2007-0072.html
Third Party Advisory
([email protected])
-
http://www.redhat.com/support/errata/RHSA-2007-0073.html
Third Party Advisory, VDB Entry
([email protected])
-
http://www.securityfocus.com/bid/21675
Patch, Third Party Advisory, VDB Entry
([email protected])
-
http://www.us-cert.gov/cas/techalerts/TA07-022A.html
Third Party Advisory, US Government Resource
([email protected])
-
http://www.vupen.com/english/advisories/2006/5073
Permissions Required
([email protected])
-
http://www.vupen.com/english/advisories/2007/0936
Permissions Required
([email protected])
-
http://www.vupen.com/english/advisories/2007/1814
Permissions Required
([email protected])
-
http://www.vupen.com/english/advisories/2007/4224
Permissions Required
([email protected])
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10134
Third Party Advisory
([email protected])
-
http://dev2dev.bea.com/pub/advisory/243
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://docs.info.apple.com/article.html?artnum=307177
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00876579
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00876579
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://lists.suse.com/archive/suse-security-announce/2007-Jan/0003.html
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://scary.beasts.org/security/CESA-2005-008.txt
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/23445
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/23650
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/23835
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/24099
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/24189
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/24468
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/25283
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/25404
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/28115
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://security.gentoo.org/glsa/glsa-200701-15.xml
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://security.gentoo.org/glsa/glsa-200702-08.xml
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://securitytracker.com/id?1017425
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102729-1
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.gentoo.org/security/en/glsa/glsa-200705-20.xml
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.kb.cert.org/vuls/id/149457
Third Party Advisory, US Government Resource
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.kb.cert.org/vuls/id/939609
Third Party Advisory, US Government Resource
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.redhat.com/support/errata/RHSA-2007-0062.html
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.redhat.com/support/errata/RHSA-2007-0072.html
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.redhat.com/support/errata/RHSA-2007-0073.html
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/bid/21675
Patch, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.us-cert.gov/cas/techalerts/TA07-022A.html
Third Party Advisory, US Government Resource
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vupen.com/english/advisories/2006/5073
Permissions Required
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vupen.com/english/advisories/2007/0936
Permissions Required
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vupen.com/english/advisories/2007/1814
Permissions Required
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vupen.com/english/advisories/2007/4224
Permissions Required
(af854a3a-2127-422b-91ae-364da2661108)
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10134
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)