CVE-2014-0429
OpenJDK: Incorrect mlib/raster image validation (2D, 8027841)
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
Vulnerabilidad no especificada en Oracle Java SE 5.0u61, 6u71, 7u51, y 8; JRockit R27.8.1 y R28.3.1; y Java SE Embedded 7u51 permite a atacantes remotos afectar la confidencialidad, integridad y disponibilidad a través de vectores desconocidos relacionados con 2D.
The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit. An input validation flaw was discovered in the medialib library in the 2D component. A specially crafted image could trigger Java Virtual Machine memory corruption when processed. A remote attacker, or an untrusted Java application or applet, could possibly use this flaw to execute arbitrary code with the privileges of the user running the Java Virtual Machine. Multiple flaws were discovered in the Hotspot and 2D components in OpenJDK. An untrusted Java application or applet could use these flaws to trigger Java Virtual Machine memory corruption and possibly bypass Java sandbox restrictions.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2013-12-12 CVE Reserved
- 2014-04-15 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (21)
URL | Tag | Source |
---|---|---|
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698 | Third Party Advisory | |
http://secunia.com/advisories/58415 | Third Party Advisory | |
http://secunia.com/advisories/58974 | Third Party Advisory | |
http://secunia.com/advisories/59058 | Broken Link | |
http://www-01.ibm.com/support/docview.wss?uid=swg21672080 | Third Party Advisory | |
http://www-01.ibm.com/support/docview.wss?uid=swg21676746 | Broken Link | |
http://www.securityfocus.com/bid/66856 | Third Party Advisory | |
https://www.ibm.com/support/docview.wss?uid=swg21675973 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://marc.info/?l=bugtraq&m=140852974709252&w=2 | 2022-05-13 | |
http://rhn.redhat.com/errata/RHSA-2014-0675.html | 2022-05-13 | |
http://rhn.redhat.com/errata/RHSA-2014-0685.html | 2022-05-13 | |
http://security.gentoo.org/glsa/glsa-201406-32.xml | 2022-05-13 | |
http://security.gentoo.org/glsa/glsa-201502-12.xml | 2022-05-13 | |
http://www.debian.org/security/2014/dsa-2912 | 2022-05-13 | |
http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html | 2022-05-13 | |
http://www.ubuntu.com/usn/USN-2187-1 | 2022-05-13 | |
http://www.ubuntu.com/usn/USN-2191-1 | 2022-05-13 | |
https://access.redhat.com/errata/RHSA-2014:0413 | 2022-05-13 | |
https://access.redhat.com/errata/RHSA-2014:0414 | 2022-05-13 | |
https://access.redhat.com/security/cve/CVE-2014-0429 | 2014-07-29 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1087409 | 2014-07-29 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ibm Search vendor "Ibm" | Forms Viewer Search vendor "Ibm" for product "Forms Viewer" | >= 4.0.0 < 4.0.0.3 Search vendor "Ibm" for product "Forms Viewer" and version " >= 4.0.0 < 4.0.0.3" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | - | - |
Safe
|
Ibm Search vendor "Ibm" | Forms Viewer Search vendor "Ibm" for product "Forms Viewer" | >= 8.0.0 < 8.0.1.1 Search vendor "Ibm" for product "Forms Viewer" and version " >= 8.0.0 < 8.0.1.1" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | - | - |
Safe
|
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 10.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "10.04" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 12.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "12.04" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 12.10 Search vendor "Canonical" for product "Ubuntu Linux" and version "12.10" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 13.10 Search vendor "Canonical" for product "Ubuntu Linux" and version "13.10" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 14.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "14.04" | esm |
Affected
| ||||||
Oracle Search vendor "Oracle" | Jrockit Search vendor "Oracle" for product "Jrockit" | r27.8.1 Search vendor "Oracle" for product "Jrockit" and version "r27.8.1" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Jrockit Search vendor "Oracle" for product "Jrockit" | r28.3.1 Search vendor "Oracle" for product "Jrockit" and version "r28.3.1" | - |
Affected
| ||||||
Juniper Search vendor "Juniper" | Junos Space Search vendor "Juniper" for product "Junos Space" | < 15.1 Search vendor "Juniper" for product "Junos Space" and version " < 15.1" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Jdk Search vendor "Oracle" for product "Jdk" | 1.5.0 Search vendor "Oracle" for product "Jdk" and version "1.5.0" | update61 |
Affected
| ||||||
Oracle Search vendor "Oracle" | Jdk Search vendor "Oracle" for product "Jdk" | 1.6.0 Search vendor "Oracle" for product "Jdk" and version "1.6.0" | update71 |
Affected
| ||||||
Oracle Search vendor "Oracle" | Jdk Search vendor "Oracle" for product "Jdk" | 1.7.0 Search vendor "Oracle" for product "Jdk" and version "1.7.0" | update51 |
Affected
| ||||||
Oracle Search vendor "Oracle" | Jdk Search vendor "Oracle" for product "Jdk" | 1.8.0 Search vendor "Oracle" for product "Jdk" and version "1.8.0" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Jre Search vendor "Oracle" for product "Jre" | 1.5.0 Search vendor "Oracle" for product "Jre" and version "1.5.0" | update61 |
Affected
| ||||||
Oracle Search vendor "Oracle" | Jre Search vendor "Oracle" for product "Jre" | 1.6.0 Search vendor "Oracle" for product "Jre" and version "1.6.0" | update71 |
Affected
| ||||||
Oracle Search vendor "Oracle" | Jre Search vendor "Oracle" for product "Jre" | 1.7.0 Search vendor "Oracle" for product "Jre" and version "1.7.0" | update51 |
Affected
| ||||||
Oracle Search vendor "Oracle" | Jre Search vendor "Oracle" for product "Jre" | 1.8.0 Search vendor "Oracle" for product "Jre" and version "1.8.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 6.0 Search vendor "Debian" for product "Debian Linux" and version "6.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 7.0 Search vendor "Debian" for product "Debian Linux" and version "7.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
|