exploit the possibilities
Showing 1 - 1 of 1 RSS Feed

Files

Zero Day Initiative Advisory 10-060
Posted Apr 6, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-060 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Sun's Java Runtime Environment. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific flaw exists within the handling of MixerSequencer objects. When this object is used to play a MIDI file, the GM_Song structure is populated with song data. In particular, it stores a integer value from the file and uses it later as an index into an array of function pointers. If this value is over 128 the process can be made to call a pointer outside the array. This can be leveraged to execute arbitrary code under the context of the user running the applet.

tags | advisory, java, remote, arbitrary
advisories | CVE-2010-0842
SHA-256 | 3ad78cc81ac910e99d4b6df48462459c39cba0cee045bb5cf2dd4813cbbe3da3
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
FBI And NSA Say: Stop Doing These 10 Things That Let Hackers In
Posted May 18, 2022

tags | headline, hacker, government, usa, fbi, nsa
Your Data Is Auctioned Off Up To 987 Times A Day, NGO Reports
Posted May 18, 2022

tags | headline, privacy, data loss
April VMware Bugs Abused To Deliver Mirai Malware, Exploit Log4Shell
Posted May 18, 2022

tags | headline, malware, flaw
APTs Overwhelmingly Share Known Vulnerabilities Rather Than Attack 0-Days
Posted May 18, 2022

tags | headline, hacker, malware, cyberwar, zero day
State Of Internet Crime In Q1 2022: Bot Traffic On The Rise, And More
Posted May 18, 2022

tags | headline, hacker, malware, cybercrime, data loss, botnet, fraud
Wizard Spider Hackers Hire Cold Callers To Scare Ransomware Victims Into Paying Up
Posted May 18, 2022

tags | headline, hacker, malware, cybercrime, fraud, cryptography
Sysrv-K Botnet Targets Windows, Linux
Posted May 17, 2022

tags | headline, microsoft, linux, botnet
FBI: Hackers Used Malicious PHP Code To Grab Credit Card Data
Posted May 17, 2022

tags | headline, hacker, government, bank, usa, cybercrime, fraud, fbi, backdoor
iPhones Vulnerable To Attack Even When Turned Off
Posted May 17, 2022

tags | headline, phone, flaw, apple
Don't Accidentally Hire A North Korean Hacker, FBI Warns
Posted May 17, 2022

tags | headline, hacker, government, cyberwar, spyware, korea, fbi, backdoor
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close