|Description||Stack-based buffer overflow in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows locally-launched and possibly remote untrusted Java applications to execute arbitrary code via a JAR file with a long Main-Class manifest entry.|
|Source||CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)|
|NVD severity||high (attack range: remote)|
|Debian Bugs||508194, 508195, 510972|
Vulnerable and fixed packages
The table below lists information on source packages.
|openjdk-6 (PTS)||wheezy, wheezy (security)||6b38-1.13.10-1~deb7u1||fixed|
The information below is based on the following data on fixed versions.
[etch] - sun-java5 <no-dsa> (Non-free not supported)