Uploaded image for project: 'JDK'
  1. JDK
  2. JDK-6545701

Java plugin triggers Data Execution Prevention (DEP) in 32-bit IE7 on 64-bit Vista

XMLWordPrintable

    • Icon: Bug Bug
    • Resolution: Duplicate
    • Icon: P2 P2
    • None
    • 6
    • deploy
    • x86
    • windows_vista

      FULL PRODUCT VERSION :


      ADDITIONAL OS VERSION INFORMATION :
      Vista Ultimate x64

      A DESCRIPTION OF THE PROBLEM :
      The Java plug-in for 32-bit Internet Explorer 7 triggers a Data Execution Prevention (DEP) event on 64-bit Vista. This happens only if DEP is enabled for IE7, which is not the default setting.

      This was observed with a couple of different Java applets, such as Secunia's "Software Inspector" at http://www.secunia.com/software_inspector

      Here are three more links that causes Internet Explorer 7 to shut down with a Data Execution Prevention error on my system under the circumstances I described:

      http://www.time.gov and click on a time zone to launch the Java applet there.

      http://www.java.com/en/games/desktop/radicalaces.jsp (random Java game I selected, click "TRY IT NOW!")

      http://www.java.com/en/desktop/ultramixer.jsp (random Java app I selected, click "TRY IT NOW!")



      STEPS TO FOLLOW TO REPRODUCE THE PROBLEM :
      A) enable IE7's dedicated Data Execution Prevention setting by

      1) running IE7 as an Administrator (Start > All Programs > right-click Internet Explorer and choose Run As Administrator)

      2) going to Tools > Internet Options, scrolling down to SECURITY, and enabling memory protection


      B) visit a web site that uses a Java applet, e.g. http://www.secunia.com/software_inspector

      or the above links.

      EXPECTED VERSUS ACTUAL BEHAVIOR :
      EXPECTED -
      I was expecting the Java plug-in to work normally.
      ACTUAL -
      Internet Explorer 7 gets shut down with a Data Execution Prevention alert.

      REPRODUCIBILITY :
      This bug can be reproduced always.

      CUSTOMER SUBMITTED WORKAROUND :
      Disabling IE7's Data Execution Prevention setting is a viable workaround.

            ngthomas Thomas Ng (Inactive)
            ryeung Roger Yeung (Inactive)
            Votes:
            0 Vote for this issue
            Watchers:
            1 Start watching this issue

              Created:
              Updated:
              Resolved:
              Imported:
              Indexed: