CVE-2006-2426

Sun Java Runtime Environment (JRE) 1.5.0_6 and earlier, JDK 1.5.0_6 and earlier, and SDK 1.5.0_6 and earlier allows remote attackers to cause a denial of service (disk consumption) by using the Font.createFont function to create temporary files of arbitrary size in the %temp% directory.
References
Link Resource
http://secunia.com/advisories/20132 Vendor Advisory
http://secunia.com/advisories/20457
http://secunia.com/advisories/34489
http://secunia.com/advisories/34495
http://secunia.com/advisories/34496
http://secunia.com/advisories/34632
http://secunia.com/advisories/34675
http://securityreason.com/securityalert/909
http://support.avaya.com/elmodocs2/security/ASA-2009-108.htm
http://support.avaya.com/elmodocs2/security/ASA-2009-109.htm
http://www.debian.org/security/2009/dsa-1769
http://www.illegalaccess.org/exploit/FullDiskApplet.html Exploit
http://www.mandriva.com/security/advisories?name=MDVSA-2009:137
http://www.mandriva.com/security/advisories?name=MDVSA-2009:162
http://www.novell.com/linux/security/advisories/2006-06-02.html
http://www.osvdb.org/25561
http://www.redhat.com/support/errata/RHSA-2009-0392.html
http://www.redhat.com/support/errata/RHSA-2009-0394.html
http://www.securityfocus.com/archive/1/434001/100/0/threaded
http://www.securityfocus.com/bid/17981
http://www.ubuntu.com/usn/usn-748-1
http://www.vupen.com/english/advisories/2006/1824
https://exchange.xforce.ibmcloud.com/vulnerabilities/26493
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10609
https://rhn.redhat.com/errata/RHSA-2009-0377.html
http://secunia.com/advisories/20132 Vendor Advisory
http://secunia.com/advisories/20457
http://secunia.com/advisories/34489
http://secunia.com/advisories/34495
http://secunia.com/advisories/34496
http://secunia.com/advisories/34632
http://secunia.com/advisories/34675
http://securityreason.com/securityalert/909
http://support.avaya.com/elmodocs2/security/ASA-2009-108.htm
http://support.avaya.com/elmodocs2/security/ASA-2009-109.htm
http://www.debian.org/security/2009/dsa-1769
http://www.illegalaccess.org/exploit/FullDiskApplet.html Exploit
http://www.mandriva.com/security/advisories?name=MDVSA-2009:137
http://www.mandriva.com/security/advisories?name=MDVSA-2009:162
http://www.novell.com/linux/security/advisories/2006-06-02.html
http://www.osvdb.org/25561
http://www.redhat.com/support/errata/RHSA-2009-0392.html
http://www.redhat.com/support/errata/RHSA-2009-0394.html
http://www.securityfocus.com/archive/1/434001/100/0/threaded
http://www.securityfocus.com/bid/17981
http://www.ubuntu.com/usn/usn-748-1
http://www.vupen.com/english/advisories/2006/1824
https://exchange.xforce.ibmcloud.com/vulnerabilities/26493
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10609
https://rhn.redhat.com/errata/RHSA-2009-0377.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*
cpe:2.3:a:sun:sdk:1.5.0_6:*:*:*:*:*:*:*

History

21 Nov 2024, 00:11

Type Values Removed Values Added
References () http://secunia.com/advisories/20132 - Vendor Advisory () http://secunia.com/advisories/20132 - Vendor Advisory
References () http://secunia.com/advisories/20457 - () http://secunia.com/advisories/20457 -
References () http://secunia.com/advisories/34489 - () http://secunia.com/advisories/34489 -
References () http://secunia.com/advisories/34495 - () http://secunia.com/advisories/34495 -
References () http://secunia.com/advisories/34496 - () http://secunia.com/advisories/34496 -
References () http://secunia.com/advisories/34632 - () http://secunia.com/advisories/34632 -
References () http://secunia.com/advisories/34675 - () http://secunia.com/advisories/34675 -
References () http://securityreason.com/securityalert/909 - () http://securityreason.com/securityalert/909 -
References () http://support.avaya.com/elmodocs2/security/ASA-2009-108.htm - () http://support.avaya.com/elmodocs2/security/ASA-2009-108.htm -
References () http://support.avaya.com/elmodocs2/security/ASA-2009-109.htm - () http://support.avaya.com/elmodocs2/security/ASA-2009-109.htm -
References () http://www.debian.org/security/2009/dsa-1769 - () http://www.debian.org/security/2009/dsa-1769 -
References () http://www.illegalaccess.org/exploit/FullDiskApplet.html - Exploit () http://www.illegalaccess.org/exploit/FullDiskApplet.html - Exploit
References () http://www.mandriva.com/security/advisories?name=MDVSA-2009:137 - () http://www.mandriva.com/security/advisories?name=MDVSA-2009:137 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2009:162 - () http://www.mandriva.com/security/advisories?name=MDVSA-2009:162 -
References () http://www.novell.com/linux/security/advisories/2006-06-02.html - () http://www.novell.com/linux/security/advisories/2006-06-02.html -
References () http://www.osvdb.org/25561 - () http://www.osvdb.org/25561 -
References () http://www.redhat.com/support/errata/RHSA-2009-0392.html - () http://www.redhat.com/support/errata/RHSA-2009-0392.html -
References () http://www.redhat.com/support/errata/RHSA-2009-0394.html - () http://www.redhat.com/support/errata/RHSA-2009-0394.html -
References () http://www.securityfocus.com/archive/1/434001/100/0/threaded - () http://www.securityfocus.com/archive/1/434001/100/0/threaded -
References () http://www.securityfocus.com/bid/17981 - () http://www.securityfocus.com/bid/17981 -
References () http://www.ubuntu.com/usn/usn-748-1 - () http://www.ubuntu.com/usn/usn-748-1 -
References () http://www.vupen.com/english/advisories/2006/1824 - () http://www.vupen.com/english/advisories/2006/1824 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/26493 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/26493 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10609 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10609 -
References () https://rhn.redhat.com/errata/RHSA-2009-0377.html - () https://rhn.redhat.com/errata/RHSA-2009-0377.html -

Information

Published : 2006-05-17 10:06

Updated : 2024-11-21 00:11


NVD link : CVE-2006-2426

Mitre link : CVE-2006-2426

CVE.ORG link : CVE-2006-2426


JSON object : View

Products Affected

sun

  • sdk
  • jre
  • jdk