Risks
Advisories
Browse
or
or
Ubuntu Security Notice - openjdk-6 vulnerabilities (USN-1755-1)
==========================================================================
Ubuntu Security Notice USN-1755-1
March 05, 2013

openjdk-6 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 LTS
- Ubuntu 11.10
- Ubuntu 10.04 LTS

Summary:

OpenJDK could be made to crash or run programs as your login if it opened a
specially crafted file.

Software Description:
- openjdk-6: Open Source Java implementation

Details:

It was discovered that OpenJDK did not properly validate certain types
of images. A remote attacker could exploit this to cause OpenJDK to crash.
(CVE-2013-0809)

It was discovered that OpenJDK did not properly check return values when
performing color conversion for images. If a user were tricked into
opening a crafted image with OpenJDK, such as with the Java plugin, a
remote attacker could cause OpenJDK to crash or execute arbitrary code
outside of the Java sandbox with the privileges of the user invoking the
program. (CVE-2013-1493)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 LTS:
  icedtea-6-jre-cacao             6b27-1.12.3-0ubuntu1~12.04.1
  icedtea-6-jre-jamvm             6b27-1.12.3-0ubuntu1~12.04.1
  openjdk-6-jre                   6b27-1.12.3-0ubuntu1~12.04.1
  openjdk-6-jre-headless          6b27-1.12.3-0ubuntu1~12.04.1
  openjdk-6-jre-lib               6b27-1.12.3-0ubuntu1~12.04.1
  openjdk-6-jre-zero              6b27-1.12.3-0ubuntu1~12.04.1

Ubuntu 11.10:
  icedtea-6-jre-cacao             6b27-1.12.3-0ubuntu1~11.10.1
  icedtea-6-jre-jamvm             6b27-1.12.3-0ubuntu1~11.10.1
  openjdk-6-jre                   6b27-1.12.3-0ubuntu1~11.10.1
  openjdk-6-jre-headless          6b27-1.12.3-0ubuntu1~11.10.1
  openjdk-6-jre-lib               6b27-1.12.3-0ubuntu1~11.10.1
  openjdk-6-jre-zero              6b27-1.12.3-0ubuntu1~11.10.1

Ubuntu 10.04 LTS:
  icedtea-6-jre-cacao             6b27-1.12.3-0ubuntu1~10.04.1
  openjdk-6-jre                   6b27-1.12.3-0ubuntu1~10.04.1
  openjdk-6-jre-headless          6b27-1.12.3-0ubuntu1~10.04.1
  openjdk-6-jre-lib               6b27-1.12.3-0ubuntu1~10.04.1
  openjdk-6-jre-zero              6b27-1.12.3-0ubuntu1~10.04.1

After a standard system update you need to restart any applications using
OpenJDK, such as your browser, to make all the necessary changes.

References:
  http://www.ubuntu.com/usn/usn-1755-1
  CVE-2013-0809, CVE-2013-1493

Package Information:

https://launchpad.net/ubuntu/+source/openjdk-6/6b27-1.12.3-0ubuntu1~12.04.1

https://launchpad.net/ubuntu/+source/openjdk-6/6b27-1.12.3-0ubuntu1~11.10.1

https://launchpad.net/ubuntu/+source/openjdk-6/6b27-1.12.3-0ubuntu1~10.04.1




Spotlight

Windows 0-day exploited in ongoing attacks, temporary workarounds offered

Posted on 22 October 2014.  |  A new Windows zero-day vulnerability is being actively exploited in the wild and is primarily a risk to users on servers and workstations that open documents with embedded OLE objects.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Oct 23rd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //