10
CVSSv2

CVE-2016-0483

Published: 21/01/2016 Updated: 13/05/2022
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Unspecified vulnerability in Oracle Java SE 6u105, 7u91, and 8u66; Java SE Embedded 8u65; and JRockit R28.3.8 allows remote malicious users to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that this is a heap-based buffer overflow in the readImage function, which allows remote malicious users to execute arbitrary code via crafted image data.

Vulnerable Product Search on Vulmon Subscribe to Product

oracle jdk 1.8.0

oracle jdk 1.6.0

oracle jdk 1.7.0

oracle jre 1.6.0

oracle jre 1.7.0

oracle jre 1.8.0

oracle jrockit r28.3.8

canonical ubuntu linux 12.04

canonical ubuntu linux 15.10

canonical ubuntu linux 14.04

canonical ubuntu linux 15.04

Vendor Advisories

Several security issues were fixed in OpenJDK 7 ...
Several security issues were fixed in OpenJDK 6 ...
Several vulnerabilities have been discovered in OpenJDK, an implementation of the Oracle Java platform, resulting in breakouts of the Java sandbox, information disclosure, denial of service and insecure cryptography For the oldstable distribution (wheezy), these problems have been fixed in version 6b38-11310-1~deb7u1 We recommend that you upgra ...
Several vulnerabilities have been discovered in OpenJDK, an implementation of the Oracle Java platform, resulting in breakouts of the Java sandbox, information disclosur, denial of service and insecure cryptography For the oldstable distribution (wheezy), these problems have been fixed in version 7u95-264-1~deb7u1 For the stable distribution (j ...
An out-of-bounds write flaw was found in the JPEG image format decoder in the AWT component in OpenJDK A specially crafted JPEG image could cause a Java application to crash or, possibly execute arbitrary code An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions ...
An out-of-bounds write flaw was found in the JPEG image format decoder in the AWT component in OpenJDK A specially crafted JPEG image could cause a Java application to crash or, possibly execute arbitrary code An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions (CVE-2016-0483) A flaw was found in the w ...
An out-of-bounds write flaw was found in the JPEG image format decoder in the AWT component in OpenJDK A specially crafted JPEG image could cause a Java application to crash or, possibly execute arbitrary code An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions (CVE-2016-0483) An integer signedness iss ...
An out-of-bounds write flaw was found in the JPEG image format decoder in the AWT component in OpenJDK A specially crafted JPEG image could cause a Java application to crash or, possibly execute arbitrary code An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions (CVE-2016-0483) An integer signedness iss ...

References

NVD-CWE-noinfohttp://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.htmlhttp://www.securitytracker.com/id/1034715http://www.zerodayinitiative.com/advisories/ZDI-16-032http://www.ubuntu.com/usn/USN-2885-1http://www.ubuntu.com/usn/USN-2884-1http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.htmlhttps://access.redhat.com/errata/RHSA-2016:1430https://security.gentoo.org/glsa/201603-14http://www.debian.org/security/2016/dsa-3465http://rhn.redhat.com/errata/RHSA-2016-0053.htmlhttp://rhn.redhat.com/errata/RHSA-2016-0054.htmlhttp://rhn.redhat.com/errata/RHSA-2016-0049.htmlhttp://rhn.redhat.com/errata/RHSA-2016-0057.htmlhttp://rhn.redhat.com/errata/RHSA-2016-0056.htmlhttp://rhn.redhat.com/errata/RHSA-2016-0055.htmlhttp://rhn.redhat.com/errata/RHSA-2016-0067.htmlhttp://rhn.redhat.com/errata/RHSA-2016-0050.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.htmlhttp://www.debian.org/security/2016/dsa-3458http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.htmlhttps://security.gentoo.org/glsa/201610-08https://nvd.nist.govhttps://usn.ubuntu.com/2884-1/https://access.redhat.com/security/cve/cve-2016-0483