Integer overflow in the PulseAudioTargetDataL class in src/java/org/classpath/icedtea/pulseaudio/PulseAudioTargetDataLine.java in Pulse-Java, as used in OpenJDK 1.6.0.0 and other products, allows remote attackers to cause a denial of service (applet crash) via a crafted Pulse Audio source data line.
Weaknesses in this category are related to improper calculation or conversion of numbers.
Link | Tags |
---|---|
http://www.mandriva.com/security/advisories?name=MDVSA-2009:137 | vendor advisory |
http://secunia.com/advisories/34623 | third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/50383 | vdb entry |
http://www.vupen.com/english/advisories/2009/0965 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=492367 | |
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00204.html | vendor advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2009:162 | vendor advisory |
http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2009-February/004729.html | mailing list |
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00203.html | vendor advisory |