Check Point Reference: | CPAI-2013-1636 |
Date Published: | 24 Mar 2013 |
Severity: | High |
Last Updated: | Thursday 09 January, 2025 |
Source: | CVE-2013-0809 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | Oracle Java Development Kit (JDK) 5 Update 40 and prior Oracle Java Development Kit (JDK) 6 Update 41 and prior Oracle Java Development Kit (JDK) 7 Update 15 and prior Oracle Java Runtime Environment (JRE) 5 Update 40 and prior Oracle Java Runtime Environment (JRE) 6 Update 41 and prior Oracle Java Runtime Environment (JRE) 7 Update 15 and prior |
Vulnerability Description | A code execution vulnerability exists in the 2D component of Oracle Java. The vulnerability is due to an integer overflow in the ImagingLib class. A remote unauthenticated attacker can exploit this vulnerability by enticing a user to open a malicious web page. Successful exploitation of this vulnerability can result in the execution of arbitrary code on a target system in the context of the affected service. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your product to the latest update. For information on how to update , go to SBP-2006-05, Protection tab and select the version of your choice.
SmartView Tracker will log the following entries:
Attack Name: Oracle Protection Violation
Attack Information: Oracle Java 2D ImagingLib Integer Overflow