2017-10-16 12:31:07 -04:00
{
2019-03-17 21:51:57 +00:00
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org" ,
"ID" : "CVE-2007-0243" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
2017-10-16 12:31:07 -04:00
]
2019-03-17 21:51:57 +00:00
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
"value" : "Buffer overflow in Sun JDK and Java Runtime Environment (JRE) 5.0 Update 9 and earlier, SDK and JRE 1.4.2_12 and earlier, and SDK and JRE 1.3.1_18 and earlier allows applets to gain privileges via a GIF image with a block with a 0 width field, which triggers memory corruption."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"name" : "20070117 ZDI-07-005: Sun Microsystems Java GIF File Parsing Memory Corruption Vulnerability" ,
"refsource" : "BUGTRAQ" ,
"url" : "http://www.securityfocus.com/archive/1/457159/100/0/threaded"
} ,
{
"name" : "102760" ,
"refsource" : "SUNALERT" ,
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102760-1"
} ,
{
"name" : "http://docs.info.apple.com/article.html?artnum=307177" ,
"refsource" : "MISC" ,
"url" : "http://docs.info.apple.com/article.html?artnum=307177"
} ,
{
"name" : "24468" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/24468"
} ,
{
"name" : "RHSA-2007:0166" ,
"refsource" : "REDHAT" ,
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0166.html"
} ,
{
"name" : "VU#388289" ,
"refsource" : "CERT-VN" ,
"url" : "http://www.kb.cert.org/vuls/id/388289"
} ,
{
"name" : "HPSBUX02196" ,
"refsource" : "HP" ,
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00876579"
} ,
{
"name" : "26049" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/26049"
} ,
{
"name" : "ADV-2007-1814" ,
"refsource" : "VUPEN" ,
"url" : "http://www.vupen.com/english/advisories/2007/1814"
} ,
{
"name" : "24202" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/24202"
} ,
{
"name" : "20070121 Sun Microsystems Java GIF File Parsing Memory Corruption Vulnerability Prove Of Concept Exploit" ,
"refsource" : "BUGTRAQ" ,
"url" : "http://www.securityfocus.com/archive/1/457638/100/0/threaded"
} ,
{
"name" : "25283" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/25283"
} ,
{
"name" : "32834" ,
"refsource" : "OSVDB" ,
"url" : "http://osvdb.org/32834"
} ,
{
"name" : "24189" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/24189"
} ,
{
"name" : "SSRT071318" ,
"refsource" : "HP" ,
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00876579"
} ,
{
"name" : "SUSE-SA:2007:045" ,
"refsource" : "SUSE" ,
"url" : "http://www.novell.com/linux/security/advisories/2007_45_java.html"
} ,
{
"name" : "APPLE-SA-2007-12-14" ,
"refsource" : "APPLE" ,
"url" : "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html"
} ,
{
"name" : "2158" ,
"refsource" : "SREASON" ,
"url" : "http://securityreason.com/securityalert/2158"
} ,
{
"name" : "1017520" ,
"refsource" : "SECTRACK" ,
"url" : "http://securitytracker.com/id?1017520"
} ,
{
"name" : "RHSA-2007:0956" ,
"refsource" : "REDHAT" ,
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0956.html"
} ,
{
"name" : "http://support.novell.com/techcenter/psdb/4f850d1e2b871db609de64ec70f0089c.html" ,
"refsource" : "CONFIRM" ,
"url" : "http://support.novell.com/techcenter/psdb/4f850d1e2b871db609de64ec70f0089c.html"
} ,
{
"name" : "oval:org.mitre.oval:def:11073" ,
"refsource" : "OVAL" ,
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11073"
} ,
{
"name" : "26645" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/26645"
} ,
{
"name" : "RHSA-2007:0167" ,
"refsource" : "REDHAT" ,
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0167.html"
} ,
{
"name" : "26119" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/26119"
} ,
{
"name" : "23757" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/23757"
} ,
{
"name" : "22085" ,
"refsource" : "BID" ,
"url" : "http://www.securityfocus.com/bid/22085"
} ,
{
"name" : "ADV-2007-4224" ,
"refsource" : "VUPEN" ,
"url" : "http://www.vupen.com/english/advisories/2007/4224"
} ,
{
"name" : "24993" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/24993"
} ,
{
"name" : "28115" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/28115"
} ,
{
"name" : "RHSA-2008:0261" ,
"refsource" : "REDHAT" ,
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0261.html"
} ,
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-07-005.html" ,
"refsource" : "MISC" ,
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-07-005.html"
} ,
{
"name" : "ADV-2007-0211" ,
"refsource" : "VUPEN" ,
"url" : "http://www.vupen.com/english/advisories/2007/0211"
} ,
{
"name" : "27203" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/27203"
} ,
{
"name" : "jre-gif-bo(31537)" ,
"refsource" : "XF" ,
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/31537"
} ,
{
"name" : "ADV-2007-0936" ,
"refsource" : "VUPEN" ,
"url" : "http://www.vupen.com/english/advisories/2007/0936"
} ,
{
"name" : "GLSA-200702-08" ,
"refsource" : "GENTOO" ,
"url" : "http://security.gentoo.org/glsa/glsa-200702-08.xml"
} ,
{
"name" : "http://support.novell.com/techcenter/psdb/d2f549cc040cd81ae4a268bb5edfe918.html" ,
"refsource" : "CONFIRM" ,
"url" : "http://support.novell.com/techcenter/psdb/d2f549cc040cd81ae4a268bb5edfe918.html"
} ,
{
"name" : "GLSA-200702-07" ,
"refsource" : "GENTOO" ,
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200702-07.xml"
} ,
{
"name" : "TA07-022A" ,
"refsource" : "CERT" ,
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-022A.html"
} ,
{
"name" : "BEA07-172.00" ,
"refsource" : "BEA" ,
"url" : "http://dev2dev.bea.com/pub/advisory/242"
}
]
}
}