The Deployment Toolkit ActiveX control in deploytk.dll 6.0.130.3 in Sun Java SE Runtime Environment (aka JRE) 6 Update 13 allows remote attackers to (1) execute arbitrary code via a .jnlp URL in the argument to the launch method, and might allow remote attackers to launch JRE installation processes via the (2) installLatestJRE or (3) installJRE method.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/8665 | exploit |
http://www.shinnai.net/xplits/TXT_mhxRKrtrPLyAHRFNm7QR.html | url repurposed exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/50629 | vdb entry |
http://www.securityfocus.com/bid/34931 | vdb entry exploit |