Unspecified vulnerability in the ImageIO component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is an integer overflow in the Java Runtime Environment that allows remote attackers to execute arbitrary code via a JPEG image that contains subsample dimensions with large values, related to JPEGImageReader and "stepX".
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: oracle
Published: 2010-04-01T16:00:00
Updated: 2018-10-10T18:57:01
Reserved: 2010-03-03T00:00:00
Link: CVE-2010-0841
JSON object: View
NVD Information
Status : Modified
Published: 2010-04-01T16:30:00.920
Modified: 2018-10-30T16:26:21.390
Link: CVE-2010-0841
JSON object: View
Redhat Information
No data.
CWE