diablo-jdk- remote code execution exploit

Klaus Koch klaus at sentinel.dyndns.info
Sun Aug 9 09:30:37 UTC 2009


as of 6th of August, there's a possible remote code execution exploit known in 
both "Sun JDK and JRE 6 Update 14 and earlier" and "Sun JDK and JRE 5.0 
Update 19 and earlier"

details: http://www.cert.fi/en/reports/2009/vulnerability2009085.html

I didn't get any notifications with portaudit yet. Because I don't know who to 
contact else, I'm sending this to the port maintainer/team.

Kind regards,

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://lists.freebsd.org/pipermail/freebsd-ports/attachments/20090809/9ef83da8/attachment.pgp

More information about the freebsd-ports mailing list