// For flags

CVE-2016-0494

ICU: integer signedness issue in IndicRearrangementProcessor (OpenJDK 2D, 8140543)

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66 and Java SE Embedded 8u65 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.

Vulnerabilidad no especificada en los componentes Java SE y Java SE Embedded en Oracle Java SE 6u105, 7u91 y 8u66 y Java SE Embedded 8u65 permite a atacantes remotos afectar a la confidencialidad, la integridad y la disponibilidad a través de vectores desconocidos relacionados con 2D.

The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit. An out-of-bounds write flaw was found in the JPEG image format decoder in the AWT component in OpenJDK. A specially crafted JPEG image could cause a Java application to crash or, possibly execute arbitrary code. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions. An integer signedness issue was found in the font parsing code in the 2D component in OpenJDK. A specially crafted font file could possibly cause the Java Virtual Machine to execute arbitrary code, allowing an untrusted Java application or applet to bypass Java sandbox restrictions.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2015-12-09 CVE Reserved
  • 2016-01-21 CVE Published
  • 2024-08-05 CVE Updated
  • 2025-06-06 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-681: Incorrect Conversion between Numeric Types
CAPEC
References (28)
URL Date SRC
URL Date SRC
URL Date SRC
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html 2022-05-13
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html 2022-05-13
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html 2022-05-13
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html 2022-05-13
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html 2022-05-13
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html 2022-05-13
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html 2022-05-13
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html 2022-05-13
http://rhn.redhat.com/errata/RHSA-2016-0049.html 2022-05-13
http://rhn.redhat.com/errata/RHSA-2016-0050.html 2022-05-13
http://rhn.redhat.com/errata/RHSA-2016-0053.html 2022-05-13
http://rhn.redhat.com/errata/RHSA-2016-0054.html 2022-05-13
http://rhn.redhat.com/errata/RHSA-2016-0055.html 2022-05-13
http://rhn.redhat.com/errata/RHSA-2016-0056.html 2022-05-13
http://rhn.redhat.com/errata/RHSA-2016-0057.html 2022-05-13
http://rhn.redhat.com/errata/RHSA-2016-0067.html 2022-05-13
http://www.debian.org/security/2016/dsa-3458 2022-05-13
http://www.debian.org/security/2016/dsa-3465 2022-05-13
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html 2022-05-13
http://www.ubuntu.com/usn/USN-2884-1 2022-05-13
http://www.ubuntu.com/usn/USN-2885-1 2022-05-13
https://access.redhat.com/errata/RHSA-2016:1430 2022-05-13
https://security.gentoo.org/glsa/201603-14 2022-05-13
https://security.gentoo.org/glsa/201610-08 2022-05-13
https://access.redhat.com/security/cve/CVE-2016-0494 2016-07-18
https://bugzilla.redhat.com/show_bug.cgi?id=1298906 2016-07-18
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
12.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "12.04"
lts
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
14.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "14.04"
lts
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
15.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "15.04"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
15.10
Search vendor "Canonical" for product "Ubuntu Linux" and version "15.10"
-
Affected
Oracle
Search vendor "Oracle"
Jdk
Search vendor "Oracle" for product "Jdk"
1.6.0
Search vendor "Oracle" for product "Jdk" and version "1.6.0"
update105
Affected
Oracle
Search vendor "Oracle"
Jdk
Search vendor "Oracle" for product "Jdk"
1.7.0
Search vendor "Oracle" for product "Jdk" and version "1.7.0"
update91
Affected
Oracle
Search vendor "Oracle"
Jdk
Search vendor "Oracle" for product "Jdk"
1.8.0
Search vendor "Oracle" for product "Jdk" and version "1.8.0"
update66
Affected
Oracle
Search vendor "Oracle"
Jre
Search vendor "Oracle" for product "Jre"
1.6.0
Search vendor "Oracle" for product "Jre" and version "1.6.0"
update105
Affected
Oracle
Search vendor "Oracle"
Jre
Search vendor "Oracle" for product "Jre"
1.7.0
Search vendor "Oracle" for product "Jre" and version "1.7.0"
update91
Affected
Oracle
Search vendor "Oracle"
Jre
Search vendor "Oracle" for product "Jre"
1.8.0
Search vendor "Oracle" for product "Jre" and version "1.8.0"
update66
Affected