Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit (JDK) before 1.5.0_11-b03 and 1.6.x before 1.6.0_01-b06, and Sun Java Runtime Environment in JDK and JRE 6, JDK and JRE 5.0 Update 10 and earlier, SDK and JRE 1.4.2_14 and earlier, and SDK and JRE 1.3.1_20 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service (JVM crash) via a crafted JPEG or BMP file that triggers a buffer overflow.

Project Subscriptions

Vendors Products
Network Satellite Subscribe
Rhel Extras Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://dev2dev.bea.com/pub/advisory/248 cve-icon cve-icon
http://docs.info.apple.com/article.html?artnum=307177 cve-icon cve-icon
http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html cve-icon cve-icon
http://lists.vmware.com/pipermail/security-announce/2008/000003.html cve-icon cve-icon
http://scary.beasts.org/security/CESA-2006-004.html cve-icon cve-icon
http://secunia.com/advisories/25295 cve-icon cve-icon
http://secunia.com/advisories/25474 cve-icon cve-icon
http://secunia.com/advisories/25832 cve-icon cve-icon
http://secunia.com/advisories/26049 cve-icon cve-icon
http://secunia.com/advisories/26119 cve-icon cve-icon
http://secunia.com/advisories/26311 cve-icon cve-icon
http://secunia.com/advisories/26369 cve-icon cve-icon
http://secunia.com/advisories/26631 cve-icon cve-icon
http://secunia.com/advisories/26645 cve-icon cve-icon
http://secunia.com/advisories/26933 cve-icon cve-icon
http://secunia.com/advisories/27203 cve-icon cve-icon
http://secunia.com/advisories/27266 cve-icon cve-icon
http://secunia.com/advisories/28056 cve-icon cve-icon
http://secunia.com/advisories/28115 cve-icon cve-icon
http://secunia.com/advisories/28365 cve-icon cve-icon
http://secunia.com/advisories/29340 cve-icon cve-icon
http://secunia.com/advisories/29858 cve-icon cve-icon
http://secunia.com/advisories/30780 cve-icon cve-icon
http://secunia.com/advisories/30805 cve-icon cve-icon
http://security.gentoo.org/glsa/glsa-200706-08.xml cve-icon cve-icon
http://security.gentoo.org/glsa/glsa-200804-28.xml cve-icon cve-icon
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102934-1 cve-icon cve-icon
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200856-1 cve-icon cve-icon
http://support.novell.com/techcenter/psdb/4f850d1e2b871db609de64ec70f0089c.html cve-icon cve-icon
http://support.novell.com/techcenter/psdb/d2f549cc040cd81ae4a268bb5edfe918.html cve-icon cve-icon
http://www.attrition.org/pipermail/vim/2007-December/001862.html cve-icon cve-icon
http://www.attrition.org/pipermail/vim/2007-July/001696.html cve-icon cve-icon
http://www.attrition.org/pipermail/vim/2007-July/001697.html cve-icon cve-icon
http://www.attrition.org/pipermail/vim/2007-July/001708.html cve-icon cve-icon
http://www.gentoo.org/security/en/glsa/glsa-200705-23.xml cve-icon cve-icon
http://www.gentoo.org/security/en/glsa/glsa-200709-15.xml cve-icon cve-icon
http://www.gentoo.org/security/en/glsa/glsa-200804-20.xml cve-icon cve-icon
http://www.gentoo.org/security/en/glsa/glsa-200806-11.xml cve-icon cve-icon
http://www.kb.cert.org/vuls/id/138545 cve-icon cve-icon
http://www.novell.com/linux/security/advisories/2007_45_java.html cve-icon cve-icon
http://www.novell.com/linux/security/advisories/2007_56_ibmjava.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2007-0817.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2007-0829.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2007-0956.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2007-1086.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2008-0100.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2008-0133.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2008-0261.html cve-icon cve-icon
http://www.securityfocus.com/bid/24004 cve-icon cve-icon
http://www.securityfocus.com/bid/24267 cve-icon cve-icon
http://www.securitytracker.com/id?1018182 cve-icon cve-icon
http://www.vupen.com/english/advisories/2007/1836 cve-icon cve-icon
http://www.vupen.com/english/advisories/2007/3009 cve-icon cve-icon
http://www.vupen.com/english/advisories/2007/4224 cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/0065 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/34318 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/34652 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2007-2788 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11700 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2007-2788 cve-icon
History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T13:49:57.375Z

Reserved: 2007-05-21T00:00:00

Link: CVE-2007-2788

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2007-05-22T00:30:00.000

Modified: 2025-04-09T00:30:58.490

Link: CVE-2007-2788

cve-icon Redhat

Severity : Critical

Publid Date: 2007-05-21T00:00:00Z

Links: CVE-2007-2788 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses