SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Oracle Java SE Vendors:   Sun
(HP Issues Fix for HP-UX) Java Runtime Environment (JRE) Flaws in Storing and Processing Temporary Font Files Let Remote Users Deny Service
SecurityTracker Alert ID:  1022287
SecurityTracker URL:  http://securitytracker.com/id/1022287
CVE Reference:   CVE-2009-1100   (Links to External Site)
Date:  May 27 2009
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Prior to 6 Update 13
Description:   Two vulnerabilities were reported in Java Runtime Environment (JRE). A remote user can cause denial of service conditions.

A remote user can create an applet or Java Web Start application that, when loaded by the target user, will consume excessive disk space on the target user's system. The vulnerability occurs in the storage and processing of temporary font files.

Marc Schoenefeld reported one of these vulnerability.

Impact:   A remote user can cause denial of service conditions.
Solution:   HP has issued a fix.

For Java v6.0.03 and earlier, update to Java v6.0.04 or subsequent.
For Java v5.0.15 and earlier, update to Java v5.0.16 or subsequent.
For Java v1.4.2.21 and earlier, update to Java v1.4.2.22 or subsequent.

The HP advisory is available at:

http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01745133

Vendor URL:  sunsolve.sun.com/search/document.do?assetkey=1-66-254608-1 (Links to External Site)
Cause:   Resource error
Underlying OS:  UNIX (HP/UX)
Underlying OS Comments:  11.11, 11.23, 11.31

Message History:   This archive entry is a follow-up to the message listed below.
Mar 26 2009 Java Runtime Environment (JRE) Flaws in Storing and Processing Temporary Font Files Let Remote Users Deny Service



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, SecurityGlobal.net LLC