CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
AI Score
Confidence
High
EPSS
Percentile
96.9%
Buffer overflow in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files or execute arbitrary code via a crafted GIF image, aka CR 6804998.
Vendor | Product | Version | CPE |
---|---|---|---|
sun | jdk | * | cpe:2.3:a:sun:jdk:*:update17:*:*:*:*:*:* |
sun | jdk | * | cpe:2.3:a:sun:jdk:*:update_12:*:*:*:*:*:* |
sun | jdk | 1.5.0 | cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:* |
sun | jdk | 1.5.0 | cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:* |
sun | jdk | 1.5.0 | cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:* |
sun | jdk | 1.5.0 | cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:* |
sun | jdk | 1.5.0 | cpe:2.3:a:sun:jdk:1.5.0:update11_b03:*:*:*:*:*:* |
sun | jdk | 1.5.0 | cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:* |
sun | jdk | 1.5.0 | cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:* |
sun | jdk | 1.5.0 | cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:* |
h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01745133
lists.opensuse.org/opensuse-security-announce/2009-04/msg00001.html
lists.opensuse.org/opensuse-security-announce/2009-05/msg00003.html
lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html
lists.opensuse.org/opensuse-security-announce/2009-07/msg00001.html
marc.info/?l=bugtraq&m=124344236532162&w=2
secunia.com/advisories/34489
secunia.com/advisories/34495
secunia.com/advisories/34496
secunia.com/advisories/34632
secunia.com/advisories/34675
secunia.com/advisories/35156
secunia.com/advisories/35223
secunia.com/advisories/35255
secunia.com/advisories/35416
secunia.com/advisories/35776
secunia.com/advisories/36185
secunia.com/advisories/37386
secunia.com/advisories/37460
security.gentoo.org/glsa/glsa-200911-02.xml
sunsolve.sun.com/search/document.do?assetkey=1-26-254571-1
support.avaya.com/elmodocs2/security/ASA-2009-108.htm
support.avaya.com/elmodocs2/security/ASA-2009-109.htm
www.debian.org/security/2009/dsa-1769
www.mandriva.com/security/advisories?name=MDVSA-2009:137
www.mandriva.com/security/advisories?name=MDVSA-2009:162
www.oracle.com/technetwork/topics/security/cpujul2009-091332.html
www.redhat.com/support/errata/RHSA-2009-0392.html
www.redhat.com/support/errata/RHSA-2009-0394.html
www.redhat.com/support/errata/RHSA-2009-1038.html
www.securityfocus.com/archive/1/507985/100/0/threaded
www.securityfocus.com/bid/34240
www.securitytracker.com/id?1021913
www.ubuntu.com/usn/usn-748-1
www.vmware.com/security/advisories/VMSA-2009-0016.html
www.vupen.com/english/advisories/2009/1426
www.vupen.com/english/advisories/2009/3316
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6008
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9956
rhn.redhat.com/errata/RHSA-2009-0377.html
rhn.redhat.com/errata/RHSA-2009-1198.html