Lucene search

K
saintSAINT CorporationSAINT:1A24950ADD78B3E4AFB999749FC9E45E
HistoryNov 06, 2009 - 12:00 a.m.

Java Runtime Environment HsbParser.getSoundBank Stack Buffer Overflow

2009-11-0600:00:00
SAINT Corporation
my.saintcorporation.com
24

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.932

Percentile

99.1%

Added: 11/06/2009
CVE: CVE-2009-3867
BID: 36881
OSVDB: 59711

Background

The Java Runtime Environment (JRE) is part of the Java Development Kit (JDK), a set of programming tools for developing Java applications. The Java Runtime Environment provides the minimum requirements for executing a Java application; it consists of the Java Virtual Machine (JVM), core classes, and supporting files.

Problem

A stack buffer overflow vulnerability in the way the JRE getSoundbank() function parses long file:// URL arguments allows remote attackers to execute arbitrary commands.

Resolution

Apply one of the solutions shown in Sun Microsystems’ response.

References

<http://www.zerodayinitiative.com/advisories/ZDI-09-076/&gt;

Limitations

Exploit works on Sun Microsystems Java Runtime Environment 6 and requires the user to open the exploit page in Mozilla Firefox 2.0.X.

Platforms

Windows

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.932

Percentile

99.1%