- Description
- Integer signedness error in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via crafted glyph descriptions in a Type1 font, which bypasses a signed comparison and triggers a buffer overflow.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
- nvd@nist.gov
- CWE-189
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sun:java_runtime_environment:5.0:*:17:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C34EC26B-EA60-484F-ABAD-F1CD308FCF06"
},
{
"criteria": "cpe:2.3:a:sun:java_runtime_environment:6.0:*:12:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "83E4124E-E0A6-477D-BDBD-BB6C1887735D"
},
{
"criteria": "cpe:2.3:a:sun:java_se_development_kit:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D909E399-16B0-4C1D-A90A-4B5CFE1DFB3D"
}
],
"operator": "OR"
}
]
}
]