CVE-2009-1099

Priority
Low
Description
Integer signedness error in Java SE Development Kit (JDK) and Java Runtime
Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier,
allows remote attackers to access files or execute arbitrary code via
crafted glyph descriptions in a Type1 font, which bypasses a signed
comparison and triggers a buffer overflow.
References
Notes
kees> RedHat lists this as "OpenJDK: Type1 font processing buffer overflow vulnerability" and bug 492302.
kees> Sun's bug seems to be 6804999, from http://sunsolve.sun.com/search/document.do?assetkey=1-26-254571-1
Package
Upstream:not-affected (Sun Java only)
Ubuntu 8.04 LTS (Hardy Heron):not-affected (Sun Java only)
Ubuntu 10.04 LTS (Lucid Lynx):not-affected (Sun Java only)
Package
Upstream:released (1.5.0-18)
Ubuntu 8.04 LTS (Hardy Heron):not-affected (1.5.0-22-0ubuntu0.8.04)
Ubuntu 10.04 LTS (Lucid Lynx):DNE
Package
Upstream:released (6.13)
Ubuntu 8.04 LTS (Hardy Heron):released (6.20dlj-0ubuntu1.8.04)
Ubuntu 10.04 LTS (Lucid Lynx):released (6.20dlj-1ubuntu3)
More Information

Valid XHTML 1.0 Strict

Updated: 2012-06-01 15:19:44 UTC (commit 5347)