Unspecified vulnerability in the ImageIO component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is an integer overflow in the Java Runtime Environment that allows remote attackers to execute arbitrary code via a JPEG image that contains subsample dimensions with large values, related to JPEGImageReader and "stepX".
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: oracle
Published: 2010-04-01T16:00:00
Updated: 2024-08-07T00:59:39.414Z
Reserved: 2010-03-03T00:00:00
Link: CVE-2010-0841
Vulnrichment
No data.
NVD
Status : Modified
Published: 2010-04-01T16:30:00.920
Modified: 2024-11-21T01:13:04.077
Link: CVE-2010-0841
Redhat