CVE-2006-6731 (CNNVD-200612-547)

CRITICAL
中文标题:
Sun Java RunTime Environment多个缓冲区溢出漏洞
英文标题:
Multiple buffer overflows in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 U...
CVSS分数: 9.3
发布时间: 2006-12-26 23:00:00
漏洞类型: 其他
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Sun Java Development Kit (JDK)和Java Runtime Environment (JRE) 5.0 Update 7及更早版本、Java System Development Kit (SDK)和JRE 1.4.2_12及更早1.4.x版本和SDK和JRE 1.3.1_18及更早版本存在多个缓冲区溢出,远程攻击者可开发Java applets来读、写或执行本地文件,可能涉及(1)Java_sun_awt_image_ImagingLib_convolveBI、awt_parseRaster和awt_parseColorModel函数中的整数溢出;(2)Java_sun_awt_image_ImagingLib_lookupByteRaster函数中的栈溢出; 以及(3)在Java_sun_font_SunLayoutEngine_nativeLayout函数中的某些负数值的不当处理 。

英文描述:

Multiple buffer overflows in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 7 and earlier, Java System Development Kit (SDK) and JRE 1.4.2_12 and earlier 1.4.x versions, and SDK and JRE 1.3.1_18 and earlier allow attackers to develop Java applets that read, write, or execute local files, possibly related to (1) integer overflows in the Java_sun_awt_image_ImagingLib_convolveBI, awt_parseRaster, and awt_parseColorModel functions; (2) a stack overflow in the Java_sun_awt_image_ImagingLib_lookupByteRaster function; and (3) improper handling of certain negative values in the Java_sun_font_SunLayoutEngine_nativeLayout function. NOTE: some of these details are obtained from third party information.

CWE类型:
(暂无数据)
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
sun jdk 1.5.0 - - cpe:2.3:a:sun:jdk:1.5.0:-:*:*:*:*:*:*
sun jre 1.3.1 - - cpe:2.3:a:sun:jre:1.3.1:-:*:*:*:*:*:*
sun jre 1.3.1_2 - - cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:*
sun jre 1.3.1_03 - - cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:*
sun jre 1.3.1_04 - - cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:*
sun jre 1.3.1_05 - - cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:*
sun jre 1.3.1_06 - - cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:*
sun jre 1.3.1_07 - - cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:*
sun jre 1.3.1_08 - - cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:*
sun jre 1.3.1_09 - - cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:*
sun jre 1.3.1_10 - - cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:*
sun jre 1.3.1_11 - - cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:*
sun jre 1.3.1_12 - - cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:*
sun jre 1.3.1_13 - - cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:*
sun jre 1.3.1_14 - - cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:*
sun jre 1.3.1_15 - - cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:*
sun jre 1.3.1_16 - - cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:*
sun jre 1.3.1_17 - - cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:*
sun jre 1.3.1_18 - - cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:*
sun jre 1.4.2 - - cpe:2.3:a:sun:jre:1.4.2:-:*:*:*:*:*:*
sun jre 1.4.2_1 - - cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*
sun jre 1.4.2_2 - - cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*
sun jre 1.4.2_3 - - cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*
sun jre 1.4.2_4 - - cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*
sun jre 1.4.2_5 - - cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*
sun jre 1.4.2_6 - - cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*
sun jre 1.4.2_7 - - cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*
sun jre 1.4.2_8 - - cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*
sun jre 1.4.2_9 - - cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*
sun jre 1.4.2_10 - - cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*
sun jre 1.4.2_11 - - cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*
sun jre 1.4.2_12 - - cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*
sun jre 1.5.0 - - cpe:2.3:a:sun:jre:1.5.0:-:*:*:*:*:*:*
sun sdk 1.3.1 - - cpe:2.3:a:sun:sdk:1.3.1:*:*:*:*:*:*:*
sun sdk 1.3.1_01 - - cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*
sun sdk 1.3.1_01a - - cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*
sun sdk 1.3.1_02 - - cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*
sun sdk 1.3.1_03 - - cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*
sun sdk 1.3.1_04 - - cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*
sun sdk 1.3.1_05 - - cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*
sun sdk 1.3.1_06 - - cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*
sun sdk 1.3.1_07 - - cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*
sun sdk 1.3.1_08 - - cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*
sun sdk 1.3.1_09 - - cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*
sun sdk 1.3.1_10 - - cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*
sun sdk 1.3.1_11 - - cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*
sun sdk 1.3.1_12 - - cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*
sun sdk 1.3.1_13 - - cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*
sun sdk 1.3.1_14 - - cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*
sun sdk 1.3.1_15 - - cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*
sun sdk 1.3.1_16 - - cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*
sun sdk 1.3.1_17 - - cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*
sun sdk 1.3.1_18 - - cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*
sun sdk 1.4.2 - - cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*
sun sdk 1.4.2_1 - - cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*
sun sdk 1.4.2_2 - - cpe:2.3:a:sun:sdk:1.4.2_2:*:*:*:*:*:*:*
sun sdk 1.4.2_3 - - cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*
sun sdk 1.4.2_4 - - cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*
sun sdk 1.4.2_5 - - cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*
sun sdk 1.4.2_6 - - cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*
sun sdk 1.4.2_7 - - cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*
sun sdk 1.4.2_8 - - cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*
sun sdk 1.4.2_9 - - cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*
sun sdk 1.4.2_10 - - cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*
sun sdk 1.4.2_11 - - cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*
sun sdk 1.4.2_12 - - cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
21675 vdb-entry
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
ADV-2006-5073 vdb-entry
cve.org
访问
24468 third-party-advisory
cve.org
访问
HPSBUX02196 vendor-advisory
cve.org
访问
102729 vendor-advisory
cve.org
访问
RHSA-2007:0062 vendor-advisory
cve.org
访问
ADV-2007-1814 vdb-entry
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
25283 third-party-advisory
cve.org
访问
24099 third-party-advisory
cve.org
访问
25404 third-party-advisory
cve.org
访问
oval:org.mitre.oval:def:10134 vdb-entry
cve.org
访问
24189 third-party-advisory
cve.org
访问
APPLE-SA-2007-12-14 vendor-advisory
cve.org
访问
SUSE-SA:2007:003 vendor-advisory
cve.org
访问
VU#939609 third-party-advisory
cve.org
访问
SUSE-SA:2007:010 vendor-advisory
cve.org
访问
RHSA-2007:0072 vendor-advisory
cve.org
访问
23445 third-party-advisory
cve.org
访问
ADV-2007-4224 vdb-entry
cve.org
访问
23650 third-party-advisory
cve.org
访问
23835 third-party-advisory
cve.org
访问
1017425 vdb-entry
cve.org
访问
RHSA-2007:0073 vendor-advisory
cve.org
访问
VU#149457 third-party-advisory
cve.org
访问
GLSA-200705-20 vendor-advisory
cve.org
访问
28115 third-party-advisory
cve.org
访问
ADV-2007-0936 vdb-entry
cve.org
访问
GLSA-200702-08 vendor-advisory
cve.org
访问
TA07-022A third-party-advisory
cve.org
访问
GLSA-200701-15 vendor-advisory
cve.org
访问
BEA07-174.00 vendor-advisory
cve.org
访问
CVSS评分详情
9.3
CRITICAL
CVSS向量: AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS版本: 2.0
机密性
COMPLETE
完整性
COMPLETE
可用性
COMPLETE
时间信息
发布时间:
2006-12-26 23:00:00
修改时间:
2024-08-07 20:34:00
创建时间:
2025-11-11 15:32:39
更新时间:
2025-11-11 15:49:13
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2006-6731 2025-11-11 15:17:47 2025-11-11 07:32:39
NVD nvd_CVE-2006-6731 2025-11-11 14:51:52 2025-11-11 07:41:25
CNNVD cnnvd_CNNVD-200612-547 2025-11-11 15:08:54 2025-11-11 07:49:13
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:49:13
vulnerability_type: 未提取 → 其他; cnnvd_id: 未提取 → CNNVD-200612-547; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 其他
  • cnnvd_id: 未提取 -> CNNVD-200612-547
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:25
severity: SeverityLevel.MEDIUM → SeverityLevel.CRITICAL; cvss_score: 未提取 → 9.3; cvss_vector: NOT_EXTRACTED → AV:N/AC:M/Au:N/C:C/I:C/A:C; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 66; references_count: 34 → 33; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.CRITICAL
  • cvss_score: 未提取 -> 9.3
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:M/Au:N/C:C/I:C/A:C
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 66
  • references_count: 34 -> 33
  • data_sources: ['cve'] -> ['cve', 'nvd']