CVE-2006-2426
CVSS6.4
发布时间 :2006-05-17 06:06:00
修订时间 :2013-09-11 00:55:33
NMCOPS    

[原文]Sun Java Runtime Environment (JRE) 1.5.0_6 and earlier, JDK 1.5.0_6 and earlier, and SDK 1.5.0_6 and earlier allows remote attackers to cause a denial of service (disk consumption) by using the Font.createFont function to create temporary files of arbitrary size in the %temp% directory.


[CNNVD]Sun Java Runtime Environment Font.createFont函数 拒绝服务漏洞(CNNVD-200605-315)

        Sun Java Runtime Environment (JRE) 1.5.0_6 及之前版本, JDK 1.5.0_6及之前版本,以及SDK 1.5.0_6及之前版本可以使远程攻击者通过使用Font.createFont函数在%temp%目录中创建任意尺寸的临时文件,以造成拒绝服务(磁盘损耗)。

- CVSS (基础分值)

CVSS分值: 6.4 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:sun:jdk:1.5.0:update6Sun JDK 1.5.0_6
cpe:/a:sun:sdk:1.5.0_6Sun SDK 1.5.0_6
cpe:/a:sun:jre:1.5.0:update6Sun JRE 1.5.0_6 (JRE 5.0 Update 6)

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:10609Sun Java Runtime Environment (JRE) 1.5.0_6 and earlier, JDK 1.5.0_6 and earlier, and SDK 1.5.0_6 and earlier allows remote attackers to caus...
oval:org.mitre.oval:def:22718ELSA-2009:0377: java-1.6.0-openjdk security update (Important)
oval:org.mitre.oval:def:22708ELSA-2009:0394: java-1.5.0-sun security update (Critical)
oval:org.mitre.oval:def:21833ELSA-2009:0392: java-1.6.0-sun security update (Critical)
oval:org.mitre.oval:def:8037DSA-1769 openjdk-6 -- several vulnerabilities
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2426
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-2426
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200605-315
(官方数据源) CNNVD

- 其它链接及资源

https://rhn.redhat.com/errata/RHSA-2009-0377.html
(UNKNOWN)  REDHAT  RHSA-2009:0377
http://www.vupen.com/english/advisories/2006/1824
(UNKNOWN)  VUPEN  ADV-2006-1824
http://www.ubuntu.com/usn/usn-748-1
(UNKNOWN)  UBUNTU  USN-748-1
http://www.securityfocus.com/archive/1/archive/1/434001/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060514 JDK 1.4.2_11, 1.5.0_06, unsigned applets consuming all free harddisk space
http://www.redhat.com/support/errata/RHSA-2009-0394.html
(UNKNOWN)  REDHAT  RHSA-2009:0394
http://www.redhat.com/support/errata/RHSA-2009-0392.html
(UNKNOWN)  REDHAT  RHSA-2009:0392
http://www.mandriva.com/security/advisories?name=MDVSA-2009:162
(UNKNOWN)  MANDRIVA  MDVSA-2009:162
http://www.mandriva.com/security/advisories?name=MDVSA-2009:137
(UNKNOWN)  MANDRIVA  MDVSA-2009:137
http://www.illegalaccess.org/exploit/FullDiskApplet.html
(UNKNOWN)  MISC  http://www.illegalaccess.org/exploit/FullDiskApplet.html
http://www.debian.org/security/2009/dsa-1769
(UNKNOWN)  DEBIAN  DSA-1769
http://support.avaya.com/elmodocs2/security/ASA-2009-109.htm
(UNKNOWN)  CONFIRM  http://support.avaya.com/elmodocs2/security/ASA-2009-109.htm
http://support.avaya.com/elmodocs2/security/ASA-2009-108.htm
(UNKNOWN)  CONFIRM  http://support.avaya.com/elmodocs2/security/ASA-2009-108.htm
http://secunia.com/advisories/34675
(UNKNOWN)  SECUNIA  34675
http://secunia.com/advisories/34632
(UNKNOWN)  SECUNIA  34632
http://secunia.com/advisories/34496
(UNKNOWN)  SECUNIA  34496
http://secunia.com/advisories/34495
(UNKNOWN)  SECUNIA  34495
http://secunia.com/advisories/34489
(UNKNOWN)  SECUNIA  34489
http://secunia.com/advisories/20132
(VENDOR_ADVISORY)  SECUNIA  20132
http://xforce.iss.net/xforce/xfdb/26493
(UNKNOWN)  XF  sun-java-fontcreatefont-dos(26493)
http://www.securityfocus.com/bid/17981
(UNKNOWN)  BID  17981
http://www.osvdb.org/25561
(UNKNOWN)  OSVDB  25561
http://www.novell.com/linux/security/advisories/2006-06-02.html
(UNKNOWN)  SUSE  SUSE-SR:2006:012
http://securityreason.com/securityalert/909
(UNKNOWN)  SREASON  909
http://secunia.com/advisories/20457
(UNKNOWN)  SECUNIA  20457

- 漏洞信息

Sun Java Runtime Environment Font.createFont函数 拒绝服务漏洞
中危 设计错误
2006-05-17 00:00:00 2009-08-07 00:00:00
远程  
        Sun Java Runtime Environment (JRE) 1.5.0_6 及之前版本, JDK 1.5.0_6及之前版本,以及SDK 1.5.0_6及之前版本可以使远程攻击者通过使用Font.createFont函数在%temp%目录中创建任意尺寸的临时文件,以造成拒绝服务(磁盘损耗)。

- 公告与补丁

        暂无数据

- 漏洞信息 (F79714)

Mandriva Linux Security Advisory 2009-162 (PacketStormID:F79714)
2009-07-28 00:00:00
Mandriva  mandriva.com
advisory,vulnerability
linux,mandriva
CVE-2009-0581,CVE-2009-0723,CVE-2009-0733,CVE-2009-0793,CVE-2006-2426,CVE-2009-0794,CVE-2009-1093,CVE-2009-1094,CVE-2009-1096,CVE-2009-1097,CVE-2009-1098,CVE-2009-1101,CVE-2009-1102
[点击下载]

Mandriva Linux Security Advisory 2009-162 - Multiple security vulnerabilities has been identified and fixed in Little cms library embedded in OpenJDK.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2009:162
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : java-1.6.0-openjdk
 Date    : July 28, 2009
 Affected: Enterprise Server 5.0
 _______________________________________________________________________

 Problem Description:

 Multiple security vulnerabilities has been identified and fixed in
 Little cms library embedded in OpenJDK:
 
 A memory leak flaw allows remote attackers to cause a denial of service
 (memory consumption and application crash) via a crafted image file
 (CVE-2009-0581).
 
 Multiple integer overflows allow remote attackers to execute arbitrary
 code via a crafted image file that triggers a heap-based buffer
 overflow (CVE-2009-0723).
 
 Multiple stack-based buffer overflows allow remote attackers to
 execute arbitrary code via a crafted image file associated with a large
 integer value for the (1) input or (2) output channel (CVE-2009-0733).
 
 A flaw in the transformations of monochrome profiles allows remote
 attackers to cause denial of service triggered by a NULL pointer
 dereference via a crafted image file (CVE-2009-0793).
 
 Further security fixes in the JRE and in the Java API of OpenJDK:
 
 A flaw in handling temporary font files by the Java Virtual
 Machine (JVM) allows remote attackers to cause denial of service
 (CVE-2006-2426).
 
 An integer overflow flaw was found in Pulse-Java when handling Pulse
 audio source data lines. An attacker could use this flaw to cause an
 applet to crash, leading to a denial of service (CVE-2009-0794).
 
 A flaw in Java Runtime Environment initialized LDAP connections
 allows authenticated remote users to cause denial of service on the
 LDAP service (CVE-2009-1093).
 
 A flaw in the Java Runtime Environment LDAP client in handling server
 LDAP responses allows remote attackers to execute arbitrary code on
 the client side via malicious server response (CVE-2009-1094).
 
 Buffer overflows in the the Java Runtime Environment unpack200 utility
 allow remote attackers to execute arbitrary code via an crafted applet
 (CVE-2009-1095, CVE-2009-1096).
 
 A buffer overflow in the splash screen processing allows a attackers
 to execute arbitrary code (CVE-2009-1097).
 
 A buffer overflow in GIF images handling allows remote attackers to
 execute arbitrary code via an crafted GIF image (CVE-2009-1098).
 
 A flaw in the Java API for XML Web Services (JAX-WS) service endpoint
 handling allows remote attackers to cause a denial of service on the
 service endpoint's server side (CVE-2009-1101).
 
 A flaw in the Java Runtime Environment Virtual Machine code generation
 allows remote attackers to execute arbitrary code via a crafted applet
 (CVE-2009-1102).
 
 This update provides fixes for these issues.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0581
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0723
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0733
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0793
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2426
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0794
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1093
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1094
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1096
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1097
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1098
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1101
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1102
 _______________________________________________________________________

 Updated Packages:

 Mandriva Enterprise Server 5:
 f6368a18b2b8db81a7469b5135b7ee06  mes5/i586/java-1.6.0-openjdk-1.6.0.0-0.20.b16.0.3mdvmes5.i586.rpm
 f2be106ac66e9a50f4ba74cbefda770c  mes5/i586/java-1.6.0-openjdk-demo-1.6.0.0-0.20.b16.0.3mdvmes5.i586.rpm
 31a5ec29a095406a456704102f0fcfed  mes5/i586/java-1.6.0-openjdk-devel-1.6.0.0-0.20.b16.0.3mdvmes5.i586.rpm
 1f1344246611ade062f5cff22248a85c  mes5/i586/java-1.6.0-openjdk-javadoc-1.6.0.0-0.20.b16.0.3mdvmes5.i586.rpm
 df7a7fe90e1574841ef4e9c54dbc1b03  mes5/i586/java-1.6.0-openjdk-plugin-1.6.0.0-0.20.b16.0.3mdvmes5.i586.rpm
 4f58dd3aede5767fe67b3615b005dae4  mes5/i586/java-1.6.0-openjdk-src-1.6.0.0-0.20.b16.0.3mdvmes5.i586.rpm
 238d40b950f5c91ece2011cd11493d7b  mes5/i586/rhino-1.7-0.0.2.2mdvmes5.noarch.rpm
 2628511efa4e84a9990d251b640d26fd  mes5/i586/rhino-demo-1.7-0.0.2.2mdvmes5.noarch.rpm
 223618bbd67a5b5ce0cbba2ee4d1fb35  mes5/i586/rhino-javadoc-1.7-0.0.2.2mdvmes5.noarch.rpm
 938b06b42a87c8c4b7db51f8af099c28  mes5/i586/rhino-manual-1.7-0.0.2.2mdvmes5.noarch.rpm 
 4011be2c0535783dfea04a5adfce1793  mes5/SRPMS/java-1.6.0-openjdk-1.6.0.0-0.20.b16.0.3mdvmes5.src.rpm
 0445ae120c5dbe9957abe9fdffc1d1dd  mes5/SRPMS/rhino-1.7-0.0.2.2mdvmes5.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 554fa4e2c062e43110dd91613f08469a  mes5/x86_64/java-1.6.0-openjdk-1.6.0.0-0.20.b16.0.3mdvmes5.x86_64.rpm
 731b4477a5869c4f2bdf3f420c3fd20b  mes5/x86_64/java-1.6.0-openjdk-demo-1.6.0.0-0.20.b16.0.3mdvmes5.x86_64.rpm
 822b29df6b3a147eadc76d2bb3f40048  mes5/x86_64/java-1.6.0-openjdk-devel-1.6.0.0-0.20.b16.0.3mdvmes5.x86_64.rpm
 dac9bcbc35102d93478a161b29c37ecd  mes5/x86_64/java-1.6.0-openjdk-javadoc-1.6.0.0-0.20.b16.0.3mdvmes5.x86_64.rpm
 39f26bcda91670cbf8acd7594cb0f805  mes5/x86_64/java-1.6.0-openjdk-plugin-1.6.0.0-0.20.b16.0.3mdvmes5.x86_64.rpm
 c075fd8bb1e7dcb55aacaa1a2ba509f2  mes5/x86_64/java-1.6.0-openjdk-src-1.6.0.0-0.20.b16.0.3mdvmes5.x86_64.rpm
 7ca12525266382ff80ff8779214d91bd  mes5/x86_64/rhino-1.7-0.0.2.2mdvmes5.noarch.rpm
 2f96a78708288e93baa3c117e74a5b20  mes5/x86_64/rhino-demo-1.7-0.0.2.2mdvmes5.noarch.rpm
 7d149643cd8be8af15bbfc538c7a2c42  mes5/x86_64/rhino-javadoc-1.7-0.0.2.2mdvmes5.noarch.rpm
 66102c3e6e500fad7e4180b429245428  mes5/x86_64/rhino-manual-1.7-0.0.2.2mdvmes5.noarch.rpm 
 4011be2c0535783dfea04a5adfce1793  mes5/SRPMS/java-1.6.0-openjdk-1.6.0.0-0.20.b16.0.3mdvmes5.src.rpm
 0445ae120c5dbe9957abe9fdffc1d1dd  mes5/SRPMS/rhino-1.7-0.0.2.2mdvmes5.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFKbxzBmqjQ0CJFipgRAuJGAJoDwP0fk1wKDTkiNEBb0s6Hp7QnewCeJvVG
dy2Zp6FCw6+KkkiKfoJnkm4=
=TYCT
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
    

- 漏洞信息 (F78545)

Mandriva Linux Security Advisory 2009-137 (PacketStormID:F78545)
2009-06-19 00:00:00
Mandriva  mandriva.com
advisory,java,vulnerability
linux,mandriva
CVE-2009-0581,CVE-2009-0723,CVE-2009-0733,CVE-2009-0793,CVE-2006-2426,CVE-2009-0794,CVE-2009-1093,CVE-2009-1094,CVE-2009-1096,CVE-2009-1097,CVE-2009-1098,CVE-2009-1101,CVE-2009-1102
[点击下载]

Mandriva Linux Security Advisory 2009-137 - Multiple security vulnerabilities has been identified and fixed in Little cms library embedded in OpenJDK. This update provides fixes for these issues. java-1.6.0-openjdk requires rhino packages and these has been further updated.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2009:137
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : java-1.6.0-openjdk
 Date    : June 20, 2009
 Affected: 2009.0, 2009.1
 _______________________________________________________________________

 Problem Description:

 Multiple security vulnerabilities has been identified and fixed in
 Little cms library embedded in OpenJDK:
 
 A memory leak flaw allows remote attackers to cause a denial of service
 (memory consumption and application crash) via a crafted image file
 (CVE-2009-0581).
 
 Multiple integer overflows allow remote attackers to execute arbitrary
 code via a crafted image file that triggers a heap-based buffer
 overflow (CVE-2009-0723).
 
 Multiple stack-based buffer overflows allow remote attackers to
 execute arbitrary code via a crafted image file associated with a large
 integer value for the (1) input or (2) output channel (CVE-2009-0733).
 
 A flaw in the transformations of monochrome profiles allows remote
 attackers to cause denial of service triggered by a NULL pointer
 dereference via a crafted image file (CVE-2009-0793).
 
 Further security fixes in the JRE and in the Java API of OpenJDK:
 
 A flaw in handling temporary font files by the Java Virtual
 Machine (JVM) allows remote attackers to cause denial of service
 (CVE-2006-2426).
 
 An integer overflow flaw was found in Pulse-Java when handling Pulse
 audio source data lines. An attacker could use this flaw to cause an
 applet to crash, leading to a denial of service (CVE-2009-0794).
 
 A flaw in Java Runtime Environment initialized LDAP connections
 allows authenticated remote users to cause denial of service on the
 LDAP service (CVE-2009-1093).
 
 A flaw in the Java Runtime Environment LDAP client in handling server
 LDAP responses allows remote attackers to execute arbitrary code on
 the client side via malicious server response (CVE-2009-1094).
 
 Buffer overflows in the the Java Runtime Environment unpack200 utility
 allow remote attackers to execute arbitrary code via an crafted applet
 (CVE-2009-1095, CVE-2009-1096).
 
 A buffer overflow in the splash screen processing allows a attackers
 to execute arbitrary code (CVE-2009-1097).
 
 A buffer overflow in GIF images handling allows remote attackers to
 execute arbitrary code via an crafted GIF image (CVE-2009-1098).
 
 A flaw in the Java API for XML Web Services (JAX-WS) service endpoint
 handling allows remote attackers to cause a denial of service on the
 service endpoint's server side (CVE-2009-1101).
 
 A flaw in the Java Runtime Environment Virtual Machine code generation
 allows remote attackers to execute arbitrary code via a crafted applet
 (CVE-2009-1102).
 
 This update provides fixes for these issues.

 Update:

 java-1.6.0-openjdk requires rhino packages and these has been further
 updated.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0581
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0723
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0733
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0793
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2426
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0794
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1093
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1094
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1096
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1097
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1098
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1101
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1102
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2009.0:
 912bfaa5d15e09b410af7b20605e7a1f  2009.0/i586/java-1.6.0-openjdk-1.6.0.0-0.20.b16.0.2mdv2009.0.i586.rpm
 786629a41c5c892280577f14b097d118  2009.0/i586/java-1.6.0-openjdk-demo-1.6.0.0-0.20.b16.0.2mdv2009.0.i586.rpm
 7a4ad719a41456847161a5da058916b1  2009.0/i586/java-1.6.0-openjdk-devel-1.6.0.0-0.20.b16.0.2mdv2009.0.i586.rpm
 dd8e42f6419f0f0c564c2d10f66c1c51  2009.0/i586/java-1.6.0-openjdk-javadoc-1.6.0.0-0.20.b16.0.2mdv2009.0.i586.rpm
 ecb3e34b02fe6366ea74d3b460913a18  2009.0/i586/java-1.6.0-openjdk-plugin-1.6.0.0-0.20.b16.0.2mdv2009.0.i586.rpm
 ec978b519cce142f0419fe9fcdfa49dd  2009.0/i586/java-1.6.0-openjdk-src-1.6.0.0-0.20.b16.0.2mdv2009.0.i586.rpm
 0985ffc0a6bc78d7cea8f2fd9c9b060b  2009.0/i586/rhino-1.7-0.0.2.1mdv2009.0.noarch.rpm
 7665b20e0252718afabd10529743522e  2009.0/i586/rhino-demo-1.7-0.0.2.1mdv2009.0.noarch.rpm
 4179b415f870de30ad9bb2227ef1fbc3  2009.0/i586/rhino-javadoc-1.7-0.0.2.1mdv2009.0.noarch.rpm
 72a6d30e3807a63e77aa2ebee32716b2  2009.0/i586/rhino-manual-1.7-0.0.2.1mdv2009.0.noarch.rpm 
 9b760b15223e7cb0146790ec5f7a77f1  2009.0/SRPMS/java-1.6.0-openjdk-1.6.0.0-0.20.b16.0.2mdv2009.0.src.rpm
 8f2f2ce3c178cd87e526a0b8fe8918e7  2009.0/SRPMS/rhino-1.7-0.0.2.1mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 5cebb2bb47360800ceac229941689fad  2009.0/x86_64/java-1.6.0-openjdk-1.6.0.0-0.20.b16.0.2mdv2009.0.x86_64.rpm
 5405df1af7fae349beb431618fba7fd2  2009.0/x86_64/java-1.6.0-openjdk-demo-1.6.0.0-0.20.b16.0.2mdv2009.0.x86_64.rpm
 03969d440901d4fd31106d792a395534  2009.0/x86_64/java-1.6.0-openjdk-devel-1.6.0.0-0.20.b16.0.2mdv2009.0.x86_64.rpm
 0e727c5840611998aef5499fa241464e  2009.0/x86_64/java-1.6.0-openjdk-javadoc-1.6.0.0-0.20.b16.0.2mdv2009.0.x86_64.rpm
 9d72b8a28b6a21dac221244ac51b2e1b  2009.0/x86_64/java-1.6.0-openjdk-plugin-1.6.0.0-0.20.b16.0.2mdv2009.0.x86_64.rpm
 8fcffa782992c1cc15858c2a0894ba00  2009.0/x86_64/java-1.6.0-openjdk-src-1.6.0.0-0.20.b16.0.2mdv2009.0.x86_64.rpm
 e3f2ad3c55426cf9c4b336ab880f9ff7  2009.0/x86_64/rhino-1.7-0.0.2.1mdv2009.0.noarch.rpm
 579005e8d20d5c559ee240c35095aeeb  2009.0/x86_64/rhino-demo-1.7-0.0.2.1mdv2009.0.noarch.rpm
 384403e6dae7eadefed13682b0b924f1  2009.0/x86_64/rhino-javadoc-1.7-0.0.2.1mdv2009.0.noarch.rpm
 fd8327ed0d455a9e116ff6fcfc96a849  2009.0/x86_64/rhino-manual-1.7-0.0.2.1mdv2009.0.noarch.rpm 
 9b760b15223e7cb0146790ec5f7a77f1  2009.0/SRPMS/java-1.6.0-openjdk-1.6.0.0-0.20.b16.0.2mdv2009.0.src.rpm
 8f2f2ce3c178cd87e526a0b8fe8918e7  2009.0/SRPMS/rhino-1.7-0.0.2.1mdv2009.0.src.rpm

 Mandriva Linux 2009.1:
 e3a6b131e6b24c5bdd1401bb09363cf7  2009.1/i586/java-1.6.0-openjdk-1.6.0.0-0.20.b16.0.2mdv2009.1.i586.rpm
 75555512a7eb8b122bb0b5d7d40168e9  2009.1/i586/java-1.6.0-openjdk-demo-1.6.0.0-0.20.b16.0.2mdv2009.1.i586.rpm
 0f45f662d06b4e820c725358d39ee9d1  2009.1/i586/java-1.6.0-openjdk-devel-1.6.0.0-0.20.b16.0.2mdv2009.1.i586.rpm
 86624b1b4142e1e97ea4e5195e7f92dd  2009.1/i586/java-1.6.0-openjdk-javadoc-1.6.0.0-0.20.b16.0.2mdv2009.1.i586.rpm
 2eb9b7a15dc0d8f02e88ea0a567ccf10  2009.1/i586/java-1.6.0-openjdk-plugin-1.6.0.0-0.20.b16.0.2mdv2009.1.i586.rpm
 8ca13d69103a5d861abdb45e8cd45bae  2009.1/i586/java-1.6.0-openjdk-src-1.6.0.0-0.20.b16.0.2mdv2009.1.i586.rpm
 b785c9c5d02abfd121bbe21d388e60c6  2009.1/i586/rhino-1.7-0.0.3.1mdv2009.1.noarch.rpm
 0d7b54d508a807f40fb895f57fc4be14  2009.1/i586/rhino-demo-1.7-0.0.3.1mdv2009.1.noarch.rpm
 25fd10e12bca1b22f10bd66150c5cac2  2009.1/i586/rhino-javadoc-1.7-0.0.3.1mdv2009.1.noarch.rpm
 2687abe0ea6c72ae1a340646a102175f  2009.1/i586/rhino-manual-1.7-0.0.3.1mdv2009.1.noarch.rpm 
 b943cbf0170778e2e5d5c924a937ab6c  2009.1/SRPMS/java-1.6.0-openjdk-1.6.0.0-0.20.b16.0.2mdv2009.1.src.rpm
 295300b3094f6486d13c0e29dd0aaa01  2009.1/SRPMS/rhino-1.7-0.0.3.1mdv2009.1.src.rpm

 Mandriva Linux 2009.1/X86_64:
 8b72108f53cf01197bc96713a4c5886b  2009.1/x86_64/java-1.6.0-openjdk-1.6.0.0-0.20.b16.0.2mdv2009.1.x86_64.rpm
 5c0ad9be1191b441ade9f9c27ebf2bfa  2009.1/x86_64/java-1.6.0-openjdk-demo-1.6.0.0-0.20.b16.0.2mdv2009.1.x86_64.rpm
 47d6080378ac8288c945adb06906ee5d  2009.1/x86_64/java-1.6.0-openjdk-devel-1.6.0.0-0.20.b16.0.2mdv2009.1.x86_64.rpm
 631685330646881f15f5fc3ce43e496c  2009.1/x86_64/java-1.6.0-openjdk-javadoc-1.6.0.0-0.20.b16.0.2mdv2009.1.x86_64.rpm
 f5f89addbe29f886b8a9a956f1bccd0d  2009.1/x86_64/java-1.6.0-openjdk-plugin-1.6.0.0-0.20.b16.0.2mdv2009.1.x86_64.rpm
 8d35903fed1e52aa5bfeee82ba27ffa8  2009.1/x86_64/java-1.6.0-openjdk-src-1.6.0.0-0.20.b16.0.2mdv2009.1.x86_64.rpm
 a13593fdfc42296a1661ff6512cedd23  2009.1/x86_64/rhino-1.7-0.0.3.1mdv2009.1.noarch.rpm
 1d371aba339ae4061610412df205af53  2009.1/x86_64/rhino-demo-1.7-0.0.3.1mdv2009.1.noarch.rpm
 92cd2f41ceaf3f6941cfd48a464e4ecd  2009.1/x86_64/rhino-javadoc-1.7-0.0.3.1mdv2009.1.noarch.rpm
 c593be725e85426ced97ff0d23c215d9  2009.1/x86_64/rhino-manual-1.7-0.0.3.1mdv2009.1.noarch.rpm 
 b943cbf0170778e2e5d5c924a937ab6c  2009.1/SRPMS/java-1.6.0-openjdk-1.6.0.0-0.20.b16.0.2mdv2009.1.src.rpm
 295300b3094f6486d13c0e29dd0aaa01  2009.1/SRPMS/rhino-1.7-0.0.3.1mdv2009.1.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFKO6OnmqjQ0CJFipgRAkvnAJ97DF6nfZ4Gl3iBkhfczGXddU3RXACeP9bE
QuKPXc7lJkSexrCFo5wWRbA=
=/8An
-----END PGP SIGNATURE-----
    

- 漏洞信息 (F76596)

Debian Linux Security Advisory 1769-1 (PacketStormID:F76596)
2009-04-14 00:00:00
Debian  debian.org
advisory,java,vulnerability
linux,debian
CVE-2006-2426,CVE-2009-0581,CVE-2009-0723,CVE-2009-0733,CVE-2009-0793,CVE-2009-1093,CVE-2009-1094,CVE-2009-1095,CVE-2009-1096,CVE-2009-1097,CVE-2009-1098,CVE-2009-1101
[点击下载]

Debian Security Advisory 1769-1 - Several vulnerabilities have been identified in OpenJDK, an implementation of the Java SE platform.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-1769-1                  security@debian.org
http://www.debian.org/security/                           Florian Weimer
April 11, 2009                        http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package        : openjdk-6
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE Id(s)      : CVE-2006-2426 CVE-2009-0581 CVE-2009-0723 CVE-2009-0733 CVE-2009-0793 CVE-2009-1093 CVE-2009-1094 CVE-2009-1095 CVE-2009-1096 CVE-2009-1097 CVE-2009-1098 CVE-2009-1101

Several vulnerabilities have been identified in OpenJDK, an
implementation of the Java SE platform.

Creation of large, temporary fonts could use up available disk space,
leading to a denial of service condition (CVE-2006-2426).

Several vulnerabilities existed in the embedded LittleCMS library,
exploitable through crafted images: a memory leak, resulting in a
denial of service condition (CVE-2009-0581), heap-based buffer
overflows, potentially allowing arbitrary code execution
(CVE-2009-0723, CVE-2009-0733), and a null-pointer dereference,
leading to denial of service (CVE-2009-0793).

The LDAP server implementation (in com.sun.jdni.ldap) did not properly
close sockets if an error was encountered, leading to a
denial-of-service condition (CVE-2009-1093).

The LDAP client implementation (in com.sun.jdni.ldap) allowed
malicious LDAP servers to execute arbitrary code on the client
(CVE-2009-1094).

The HTTP server implementation (sun.net.httpserver) contained an
unspecified denial of service vulnerability (CVE-2009-1101).

Several issues in Java Web Start have been addressed (CVE-2009-1095,
CVE-2009-1096, CVE-2009-1097, CVE-2009-1098).  The Debian packages
currently do not support Java Web Start, so these issues are not
directly exploitable, but the relevant code has been updated
nevertheless.

For the stable distribution (lenny), these problems have been fixed in
version 9.1+lenny2.

We recommend that you upgrade your openjdk-6 packages.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 5.0 alias lenny
- --------------------------------

Source archives:

  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6_6b11-9.1+lenny2.dsc
    Size/MD5 checksum:     2471 ac801bf95b5a70dc2872d3829662ec21
  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6_6b11.orig.tar.gz
    Size/MD5 checksum: 51692912 a409bb4e935a22dcbd3529dc098c58de
  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6_6b11-9.1+lenny2.diff.gz
    Size/MD5 checksum:   294391 8245a20f2c8886f5a21ccc584be55963

Architecture independent packages:

  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-doc_6b11-9.1+lenny2_all.deb
    Size/MD5 checksum: 12053188 aca3fd411328bdb8ebaecc32cb5dec8c
  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-jre-lib_6b11-9.1+lenny2_all.deb
    Size/MD5 checksum:  5270602 ac2ec87d2254d75888025068260724c9
  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-source_6b11-9.1+lenny2_all.deb
    Size/MD5 checksum: 26557844 4162900f514b37b46bd3445c31137038

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-jdk_6b11-9.1+lenny2_alpha.deb
    Size/MD5 checksum:  8173896 624e143dcca33faeef6f18b3b2dbf091
  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-jre_6b11-9.1+lenny2_alpha.deb
    Size/MD5 checksum:   260278 bec0a9dbb3193958ea38849920f207b1
  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-jre-headless_6b11-9.1+lenny2_alpha.deb
    Size/MD5 checksum: 21624912 8d671cce12b85a8c2a275b27ffdefc3c
  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-dbg_6b11-9.1+lenny2_alpha.deb
    Size/MD5 checksum: 34552586 9ef7d040a16bfb7cda895fe080a89639
  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-demo_6b11-9.1+lenny2_alpha.deb
    Size/MD5 checksum:  2373440 4a642fce362f92b7fa55ce07b9cf64ad

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-dbg_6b11-9.1+lenny2_amd64.deb
    Size/MD5 checksum: 46891228 ac3e2086cf139e8243b38c6edbd80dc7
  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-jdk_6b11-9.1+lenny2_amd64.deb
    Size/MD5 checksum:  9658430 552cfaa8544f5eedd8b9fea5188e77c5
  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-jre_6b11-9.1+lenny2_amd64.deb
    Size/MD5 checksum:   229460 e2e374c1591818a644e6a3edb0ac3ad6
  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-demo_6b11-9.1+lenny2_amd64.deb
    Size/MD5 checksum:  2351524 0c9f107821594971cc63cac39fd014b1
  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-jre-headless_6b11-9.1+lenny2_amd64.deb
    Size/MD5 checksum: 22423776 645caac427ee007eed470895fc12ab9e

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-jre-headless_6b11-9.1+lenny2_i386.deb
    Size/MD5 checksum: 23574268 b1343b60841cae842b86f18d756117e2
  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-dbg_6b11-9.1+lenny2_i386.deb
    Size/MD5 checksum: 101067580 2340584d11bc1e48fb4b984673a40244
  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-demo_6b11-9.1+lenny2_i386.deb
    Size/MD5 checksum:  2341038 723ddcefe74b00d3ea2ed76a883f1f24
  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-jre_6b11-9.1+lenny2_i386.deb
    Size/MD5 checksum:   218946 c6c020f02470f3575a692813abd1b41c
  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-jdk_6b11-9.1+lenny2_i386.deb
    Size/MD5 checksum:  9667436 0aec96944c633abdb0d501ea6aa7eb8f

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-jdk_6b11-9.1+lenny2_ia64.deb
    Size/MD5 checksum:  8289320 f73111b40487fb1d8c2a7193e8d81385
  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-demo_6b11-9.1+lenny2_ia64.deb
    Size/MD5 checksum:  2456260 a54c41e6b6ac2d78de30c3ecf34fac12
  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-jre-headless_6b11-9.1+lenny2_ia64.deb
    Size/MD5 checksum: 22549136 afc00f58991b3bcf918fc41df61c3fd0
  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-dbg_6b11-9.1+lenny2_ia64.deb
    Size/MD5 checksum: 34069370 8df511da244c3d6318ffc5d5141a61ba
  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-jre_6b11-9.1+lenny2_ia64.deb
    Size/MD5 checksum:   324686 8035c4fdc432626912a2bb3da4585ed6

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-jdk_6b11-9.1+lenny2_mips.deb
    Size/MD5 checksum:  8097690 377c76a1a56e8609da0d980070d8d16b
  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-jre_6b11-9.1+lenny2_mips.deb
    Size/MD5 checksum:   226786 0d8231609d97dd052bdced6f802fa8d5
  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-demo_6b11-9.1+lenny2_mips.deb
    Size/MD5 checksum:  2349856 a371082d2ccad75595af31fd54470381
  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-dbg_6b11-9.1+lenny2_mips.deb
    Size/MD5 checksum: 35242334 af43cfa59394220c4826d68577950df6
  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-jre-headless_6b11-9.1+lenny2_mips.deb
    Size/MD5 checksum: 21158386 d606f602b2667cfc26fc91c3680aaf12

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-jre-headless_6b11-9.1+lenny2_mipsel.deb
    Size/MD5 checksum: 21180172 8c2e20e24f3b43b74b3d91cb5aa70de3
  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-dbg_6b11-9.1+lenny2_mipsel.deb
    Size/MD5 checksum: 34096046 4cb42eb3ba7fbac9a0e3505ad057de09
  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-demo_6b11-9.1+lenny2_mipsel.deb
    Size/MD5 checksum:  2349822 387ba1e26565cd39cea6bf1b93c0a3b3
  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-jdk_6b11-9.1+lenny2_mipsel.deb
    Size/MD5 checksum:  8099274 18197ad1556942c861febdb98d6e7f23
  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-jre_6b11-9.1+lenny2_mipsel.deb
    Size/MD5 checksum:   226316 0025dc147f2fb45e59d600130129ff8f

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-jdk_6b11-9.1+lenny2_powerpc.deb
    Size/MD5 checksum:  8129342 6a173ba25b207301ffed322252118903
  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-demo_6b11-9.1+lenny2_powerpc.deb
    Size/MD5 checksum:  2386836 af23bfe3c5f4b2ce424fde40bb7f4935
  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-jre-headless_6b11-9.1+lenny2_powerpc.deb
    Size/MD5 checksum: 21316924 17cbaa7f30cccdf93848cc1bfaf5d88d
  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-dbg_6b11-9.1+lenny2_powerpc.deb
    Size/MD5 checksum: 35337320 3ea33923e7f700119ee41cc5f495524f
  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-jre_6b11-9.1+lenny2_powerpc.deb
    Size/MD5 checksum:   243502 d63bfda1e127f6b05ae355deffc1b61e

sparc architecture (Sun SPARC/UltraSPARC)

  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-demo_6b11-9.1+lenny2_sparc.deb
    Size/MD5 checksum:  2335290 473bde592db775853753221eaeb46dd2
  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-dbg_6b11-9.1+lenny2_sparc.deb
    Size/MD5 checksum: 103119614 20b1b65401329c139530e1113870b703
  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-jre-headless_6b11-9.1+lenny2_sparc.deb
    Size/MD5 checksum: 23512994 8c60d293442a38b4d6674273afb04f09
  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-jre_6b11-9.1+lenny2_sparc.deb
    Size/MD5 checksum:   220458 0a3b6eb5e25c4c5bdb4d8f30689114be
  http://security.debian.org/pool/updates/main/o/openjdk-6/openjdk-6-jdk_6b11-9.1+lenny2_sparc.deb
    Size/MD5 checksum:  9681988 1450a9fdd406c12815c7d65bbeb4b8ab


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iQEcBAEBAgAGBQJJ4KUOAAoJEL97/wQC1SS+qMwIAIsGSe+hIKgveS1tusa9au6v
EyPOATwo/a8ubY7RCO6yNOB9ET2EdwbPyBNucUqmmBEUuMDmZcmireuWl4tzoMa1
m/hhMFHi9CEbWwyjp9hseX5v1MUMpNUtI2yQthSV4iMdw2Hf+Z1WRtG8eR+qU1zu
2BrI3l5RFp1ES+nLtq3PL70pNDScg5F/LX4e1E0ROeWBhOtJdDogA9pWEl1Yeb6V
q/9J2F6NyVSslK4Kt8Tgl6vC3CCKL6QGuqmFyvE7WfNotwvYEMnyA+RCF8dhDxf9
xVHXx2TQiCOQexrPTqhkuEvj23TWdic94kn6G3CIQX8TpJAA/AF7raaSPx4j7J8=
=vShn
-----END PGP SIGNATURE-----
    

- 漏洞信息 (F76129)

Ubuntu Security Notice 748-1 (PacketStormID:F76129)
2009-03-27 00:00:00
Ubuntu  security.ubuntu.com
advisory,java,remote,denial of service,arbitrary,local,code execution
linux,ubuntu
CVE-2006-2426,CVE-2009-1093,CVE-2009-1094,CVE-2009-1095,CVE-2009-1096,CVE-2009-1097,CVE-2009-1098,CVE-2009-1100,CVE-2009-1101,CVE-2009-1102
[点击下载]

Ubuntu Security Notice USN-748-1 - It was discovered that font creation could leak temporary files. If a user were tricked into loading a malicious program or applet, a remote attacker could consume disk space, leading to a denial of service. It was discovered that the lightweight HttpServer did not correctly close files on dataless connections. A remote attacker could send specially crafted requests, leading to a denial of service. Certain 64bit Java actions would crash an application. A local attacker might be able to cause a denial of service. It was discovered that LDAP connections did not close correctly. A remote attacker could send specially crafted requests, leading to a denial of service. Java LDAP routines did not unserialize certain data correctly. A remote attacker could send specially crafted requests that could lead to arbitrary code execution. Java did not correctly check certain JAR headers. If a user or automated system were tricked into processing a malicious JAR file, a remote attacker could crash the application, leading to a denial of service. It was discovered that PNG and GIF decoding in Java could lead to memory corruption. If a user or automated system were tricked into processing a specially crafted image, a remote attacker could crash the application, leading to a denial of service.

===========================================================
Ubuntu Security Notice USN-748-1             March 26, 2009
openjdk-6 vulnerabilities
CVE-2006-2426, CVE-2009-1093, CVE-2009-1094, CVE-2009-1095,
CVE-2009-1096, CVE-2009-1097, CVE-2009-1098, CVE-2009-1100,
CVE-2009-1101, CVE-2009-1102
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 8.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 8.10:
  icedtea6-plugin                 6b12-0ubuntu6.4
  openjdk-6-jdk                   6b12-0ubuntu6.4
  openjdk-6-jre                   6b12-0ubuntu6.4
  openjdk-6-jre-headless          6b12-0ubuntu6.4
  openjdk-6-jre-lib               6b12-0ubuntu6.4

After a standard system upgrade you need to restart any Java applications
to effect the necessary changes.

Details follow:

It was discovered that font creation could leak temporary files.
If a user were tricked into loading a malicious program or applet,
a remote attacker could consume disk space, leading to a denial of
service. (CVE-2006-2426, CVE-2009-1100)

It was discovered that the lightweight HttpServer did not correctly close
files on dataless connections.  A remote attacker could send specially
crafted requests, leading to a denial of service. (CVE-2009-1101)

Certain 64bit Java actions would crash an application.  A local attacker
might be able to cause a denial of service. (CVE-2009-1102)

It was discovered that LDAP connections did not close correctly.
A remote attacker could send specially crafted requests, leading to a
denial of service.  (CVE-2009-1093)

Java LDAP routines did not unserialize certain data correctly.  A remote
attacker could send specially crafted requests that could lead to
arbitrary code execution. (CVE-2009-1094)

Java did not correctly check certain JAR headers.  If a user or
automated system were tricked into processing a malicious JAR file,
a remote attacker could crash the application, leading to a denial of
service. (CVE-2009-1095, CVE-2009-1096)

It was discovered that PNG and GIF decoding in Java could lead to memory
corruption.  If a user or automated system were tricked into processing
a specially crafted image, a remote attacker could crash the application,
leading to a denial of service. (CVE-2009-1097, CVE-2009-1098)


Updated packages for Ubuntu 8.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6_6b12-0ubuntu6.4.diff.gz
      Size/MD5:   257215 876f885acf37c0817a35956e6520de3a
    http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6_6b12-0ubuntu6.4.dsc
      Size/MD5:     2355 d8a4b0fe60497fd1f61c978c3c78e571
    http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6_6b12.orig.tar.gz
      Size/MD5: 54363262 f3aa01206f2192464b998fb7cc550686

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-doc_6b12-0ubuntu6.4_all.deb
      Size/MD5:  8469732 b032a764ce88bd155f9aaba02ecc6566
    http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jre-lib_6b12-0ubuntu6.4_all.deb
      Size/MD5:  4709872 299164cb69aa3ec883867afb7d8d9054
    http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-source_6b12-0ubuntu6.4_all.deb
      Size/MD5: 25627544 e62afaf0e692fa587de0056cf014175d
    http://security.ubuntu.com/ubuntu/pool/universe/o/openjdk-6/openjdk-6-source-files_6b12-0ubuntu6.4_all.deb
      Size/MD5: 49156004 2de3d037ef595b34ccb98324b11f1159

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/icedtea6-plugin_6b12-0ubuntu6.4_amd64.deb
      Size/MD5:    81028 8952bc76c555dc8d950b2d3bfa940b7c
    http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-dbg_6b12-0ubuntu6.4_amd64.deb
      Size/MD5: 47372520 d70f9ed68d2837e2f3f107a607b5cc96
    http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-demo_6b12-0ubuntu6.4_amd64.deb
      Size/MD5:  2366132 75294026f904346ec76397cd388252c3
    http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jdk_6b12-0ubuntu6.4_amd64.deb
      Size/MD5:  9944822 cfd88c5f3fe97c67d8eca19908344823
    http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jre-headless_6b12-0ubuntu6.4_amd64.deb
      Size/MD5: 24099904 24468c4793c974819f83b06fb41adc90
    http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jre_6b12-0ubuntu6.4_amd64.deb
      Size/MD5:   241642 240d8346bb895f9623091c94c81ae466

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/icedtea6-plugin_6b12-0ubuntu6.4_i386.deb
      Size/MD5:    71516 5c67a03b0011a3bd117fae210ca27cd9
    http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-dbg_6b12-0ubuntu6.4_i386.deb
      Size/MD5: 101847192 302ab3721553014290ce4bfdee6cb6fb
    http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-demo_6b12-0ubuntu6.4_i386.deb
      Size/MD5:  2348630 1a4c103e4d235f7d641f2e0f2ddfe4c3
    http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jdk_6b12-0ubuntu6.4_i386.deb
      Size/MD5:  9952338 c6bc056c5fa988f8841542a6801aa84d
    http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jre-headless_6b12-0ubuntu6.4_i386.deb
      Size/MD5: 25177778 41fa22a436950239955756efe7bc9112
    http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jre_6b12-0ubuntu6.4_i386.deb
      Size/MD5:   230774 5c5188e21a7a5a76763d7f651162dc3a

  lpia architecture (Low Power Intel Architecture):

    http://ports.ubuntu.com/pool/main/o/openjdk-6/icedtea6-plugin_6b12-0ubuntu6.4_lpia.deb
      Size/MD5:    72110 1b419781fc73fe42b85ff180f520edc2
    http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-dbg_6b12-0ubuntu6.4_lpia.deb
      Size/MD5: 101930130 abc646dc9df27f3415ff07dcb0c38e51
    http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-demo_6b12-0ubuntu6.4_lpia.deb
      Size/MD5:  2345400 ef0b99c18c2ce4cd1ae68f1f20d08566
    http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jdk_6b12-0ubuntu6.4_lpia.deb
      Size/MD5:  9947530 6bb618600d7c1f7ec68a68519094e0d9
    http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jre-headless_6b12-0ubuntu6.4_lpia.deb
      Size/MD5: 25207906 1b334898157a834ab05ee74593ce57e4
    http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jre_6b12-0ubuntu6.4_lpia.deb
      Size/MD5:   227556 ad49784b480e88550c61dfc069cb4d2a

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://ports.ubuntu.com/pool/main/o/openjdk-6/icedtea6-plugin_6b12-0ubuntu6.4_powerpc.deb
      Size/MD5:    77056 11313904c64bee4204f6369b4ffd5e66
    http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-dbg_6b12-0ubuntu6.4_powerpc.deb
      Size/MD5: 35898024 50945e6c1cbed766ea52b78fb7ed2ac5
    http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-demo_6b12-0ubuntu6.4_powerpc.deb
      Size/MD5:  2393022 c04df84eeb2373a7f0cd84ad85610188
    http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jdk_6b12-0ubuntu6.4_powerpc.deb
      Size/MD5:  8600518 197d84aae1eaafdab671a5749b42b86c
    http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jre-headless_6b12-0ubuntu6.4_powerpc.deb
      Size/MD5: 22988430 27721c39140811fd6ef9b00124c10b70
    http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jre_6b12-0ubuntu6.4_powerpc.deb
      Size/MD5:   255542 a7d6deeb5ef7143bb8631c593f4c36c6

  sparc architecture (Sun SPARC/UltraSPARC):

    http://ports.ubuntu.com/pool/main/o/openjdk-6/icedtea6-plugin_6b12-0ubuntu6.4_sparc.deb
      Size/MD5:    70098 44eca12cf6d8ed10e02a755772052b5b
    http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-dbg_6b12-0ubuntu6.4_sparc.deb
      Size/MD5: 103688730 0034a5b63b78e38f3c5bb0d0b920b9cf
    http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-demo_6b12-0ubuntu6.4_sparc.deb
      Size/MD5:  2355160 e8adc4df2d4bc39f66da967b5272d455
    http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jdk_6b12-0ubuntu6.4_sparc.deb
      Size/MD5:  9940784 c35a4115f4587df050af4c16de829674
    http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jre-headless_6b12-0ubuntu6.4_sparc.deb
      Size/MD5: 25193444 0e4de129d523ef09bed9e3a22c6cecf3
    http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jre_6b12-0ubuntu6.4_sparc.deb
      Size/MD5:   233052 1773a666f39a632f458e850fb300ef12

    

- 漏洞信息

25561
Sun Java JRE Font.createFont() Method Disk Space Saturation DoS
Remote / Network Access Denial of Service
Loss of Availability
Exploit Public Vendor Verified

- 漏洞描述

Java JDK/JRE contains a flaw that may allow a remote denial of service. The issue is triggered when applets are permitted to create large temporary files using the Font.createFont method but are never removed, and will result in loss of availability for the platform.

- 时间线

2006-05-16 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

- 漏洞信息

Sun Java Applet Font.createFont Remote Denial Of Service Vulnerability
Design Error 17981
Yes No
2006-05-15 12:00:00 2009-12-16 02:13:00
Marc Schoenefeld

- 受影响的程序版本

Ubuntu Ubuntu Linux 8.10 sparc
Ubuntu Ubuntu Linux 8.10 powerpc
Ubuntu Ubuntu Linux 8.10 lpia
Ubuntu Ubuntu Linux 8.10 i386
Ubuntu Ubuntu Linux 8.10 amd64
Sun Java 2 Runtime Environment 1.5 _06
Sun Java 2 Runtime Environment 1.4.2 _11
S.u.S.E. Linux Professional 10.0 OSS
S.u.S.E. Linux Professional 9.3 x86_64
S.u.S.E. Linux Professional 9.3
S.u.S.E. Linux Professional 8.2
S.u.S.E. Linux Professional 10.1
S.u.S.E. Linux Personal 10.0 OSS
S.u.S.E. Linux Personal 9.3 x86_64
S.u.S.E. Linux Personal 9.3
S.u.S.E. Linux Personal 10.1
RedHat Red Hat Network Satellite (for RHEL 4) 5.1
RedHat Enterprise Linux WS Extras 4
RedHat Enterprise Linux Extras 4
RedHat Enterprise Linux ES Extras 4
RedHat Enterprise Linux AS Extras 4
RedHat Desktop Extras 4
Red Hat Enterprise Linux Supplementary 5 server
Red Hat Enterprise Linux Desktop Supplementary 5 client
Red Hat Enterprise Linux Desktop 5 client
Red Hat Enterprise Linux 5 Server
Mandriva Linux Mandrake 2009.1 x86_64
Mandriva Linux Mandrake 2009.1
Mandriva Linux Mandrake 2009.0 x86_64
Mandriva Linux Mandrake 2009.0
MandrakeSoft Enterprise Server 5 x86_64
MandrakeSoft Enterprise Server 5
Debian Linux 5.0 sparc
Debian Linux 5.0 s/390
Debian Linux 5.0 powerpc
Debian Linux 5.0 mipsel
Debian Linux 5.0 mips
Debian Linux 5.0 m68k
Debian Linux 5.0 ia-64
Debian Linux 5.0 ia-32
Debian Linux 5.0 hppa
Debian Linux 5.0 armel
Debian Linux 5.0 arm
Debian Linux 5.0 amd64
Debian Linux 5.0 alpha
Debian Linux 5.0

- 漏洞讨论

Sun Java is prone to a remote denial-of-service vulnerability because the application fails to properly handle certain Java applets.

Successfully exploiting this issue will cause the application to create a temporary file that will grow in an unbounded fashion, consuming all available disk space. This will likely result in a denial-of-service condition.

Sun Java JDK 1.4.2_11 and 1.5.0_06 are vulnerable; other versions may also be affected.

- 漏洞利用

The following exploit code is available:

- 解决方案

Updates are available. Please see the references for more information.


Debian Linux 5.0 ia-64

Mandriva Linux Mandrake 2009.1 x86_64

Ubuntu Ubuntu Linux 8.10 powerpc

Ubuntu Ubuntu Linux 8.10 i386

MandrakeSoft Enterprise Server 5 x86_64

Debian Linux 5.0 alpha

Debian Linux 5.0 ia-32

MandrakeSoft Enterprise Server 5

Debian Linux 5.0 s/390

Debian Linux 5.0 mipsel

Ubuntu Ubuntu Linux 8.10 lpia

Debian Linux 5.0 hppa

Debian Linux 5.0 m68k

Ubuntu Ubuntu Linux 8.10 sparc

Debian Linux 5.0 arm

Mandriva Linux Mandrake 2009.0

Debian Linux 5.0 armel

Debian Linux 5.0

Debian Linux 5.0 amd64

Mandriva Linux Mandrake 2009.0 x86_64

Debian Linux 5.0 mips

Debian Linux 5.0 powerpc

Ubuntu Ubuntu Linux 8.10 amd64

Mandriva Linux Mandrake 2009.1

Debian Linux 5.0 sparc

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站