CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
High
EPSS
Percentile
91.7%
Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.
Vendor | Product | Version | CPE |
---|---|---|---|
sun | jre | 5.0 | cpe:/a:sun:jre:5.0:update_10:: |
sun | jdk | 5.0 | cpe:/a:sun:jdk:5.0:update_5:: |
sun | jre | 6 | cpe:/a:sun:jre:6:update_12:: |
sun | jdk | 5.0 | cpe:/a:sun:jdk:5.0:update_15:: |
sun | jre | 6 | cpe:/a:sun:jre:6:update_1:: |
sun | jdk | 5.0 | cpe:/a:sun:jdk:5.0:update_17:: |
sun | jdk | 5.0 | cpe:/a:sun:jdk:5.0:update_16:: |
sun | jdk | 6 | cpe:/a:sun:jdk:6:update_5:: |
sun | jdk | 5.0 | cpe:/a:sun:jdk:5.0:update_9:: |
sun | jdk | 5.0 | cpe:/a:sun:jdk:5.0:update_10:: |
labs.idefense.com/intelligence/vulnerabilities/display.php?id=814
lists.apple.com/archives/security-announce/2009/Sep/msg00000.html
lists.opensuse.org/opensuse-security-announce/2009-08/msg00003.html
lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html
lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html
marc.info/?l=bugtraq&m=125787273209737&w=2
secunia.com/advisories/36162
secunia.com/advisories/36176
secunia.com/advisories/36180
secunia.com/advisories/36199
secunia.com/advisories/36248
secunia.com/advisories/37300
secunia.com/advisories/37386
secunia.com/advisories/37460
security.gentoo.org/glsa/glsa-200911-02.xml
sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1
sunsolve.sun.com/search/document.do?assetkey=1-66-263488-1
www.mandriva.com/security/advisories?name=MDVSA-2009:209
www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html
www.securityfocus.com/archive/1/507985/100/0/threaded
www.us-cert.gov/cas/techalerts/TA09-294A.html
www.vmware.com/security/advisories/VMSA-2009-0016.html
www.vupen.com/english/advisories/2009/2543
www.vupen.com/english/advisories/2009/3316
www.zerodayinitiative.com/advisories/ZDI-09-049/
exchange.xforce.ibmcloud.com/vulnerabilities/52307
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10840
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8415
rhn.redhat.com/errata/RHSA-2009-1199.html
rhn.redhat.com/errata/RHSA-2009-1200.html
rhn.redhat.com/errata/RHSA-2009-1201.html
www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html
www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html