Advisory Details

April 5th, 2010

Sun Java Runtime Environment XNewPtr Remote Code Execution Vulnerability

ZDI-10-052
ZDI-CAN-629

CVE ID CVE-2010-0843
CVSS SCORE 10.0, (AV:N/AC:L/Au:N/C:C/I:C/A:C)
AFFECTED VENDORS Sun Microsystems
AFFECTED PRODUCTS Java Runtime
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 9648. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Sun's Java Runtime Environment. User interaction is required to exploit this vulnerability in that the target must visit a malicious page.

The specific flaw exists within a function responsible for allocating objects in the com.sun.media.sound libraries. This function takes an integer parameter and adds a fixed amount to it before allocating from the heap. This can be exploited to gain arbitrary code execution by forcing a call to this allocator with a large enough integer parameter.

ADDITIONAL DETAILS Sun Microsystems has issued an update to correct this vulnerability. More details can be found at:
http://www.oracle.com/technology/deploy/security/critical-patch-updates/javacpumar2010.html
DISCLOSURE TIMELINE
  • 2009-12-10 - Vulnerability reported to vendor
  • 2010-04-05 - Coordinated public release of advisory
CREDIT Peter Vreugdenhil ( http://vreugdenhilresearch.nl )
BACK TO ADVISORIES