CVE-2007-3655
JRE 5.0 Update 11 and earlier, 6.0 Update 1 and earlier - Remote Code Execution via JNLP File
Title source: llmExploitation Summary
EIP tracks 2 public exploits for CVE-2007-3655. PoCs published by ZhenHan.Liu, Daniel Soeder.
AI-analyzed exploit summary This VBScript generates a malicious JNLP file exploiting a buffer overflow in Java Web Start (javaws.exe) by crafting an overly long 'codebase' attribute. The PoC demonstrates the vulnerability but lacks a functional shellcode payload.
Description
Stack-based buffer overflow in javaws.exe in Sun Java Web Start in JRE 5.0 Update 11 and earlier, and 6.0 Update 1 and earlier, allows remote attackers to execute arbitrary code via a long codebase attribute in a JNLP file.
Exploits (2)
This VBScript generates a malicious JNLP file exploiting a buffer overflow in Java Web Start (javaws.exe) by crafting an overly long 'codebase' attribute. The PoC demonstrates the vulnerability but lacks a functional shellcode payload.
This VBScript generates a malicious JNLP file exploiting a stack-based buffer overflow in Sun Java Runtime Environment (CVE-2007-3655). The overflow occurs due to improper bounds checking in the `sprintf` function when processing a long `codebase` attribute.